1.
A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.
Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?
Correct Answer
A. Update the OS of the smartpHones
Explanation
The technician should first update the OS of the smartphones. Since both users are experiencing the same issue with the specific application, it is likely that the issue is caused by an outdated operating system. Updating the OS can help resolve any compatibility issues and ensure that the application runs smoothly. Clearing the application cache, rolling back the application, or reinstalling the application may not address the root cause of the problem. Therefore, updating the OS is the best first step to take in this situation.
2.
A technician is working on a Windows 10 PC that is running slowly.
Which of the following commands should the technician use to correct this issue? (Select two.)
Correct Answer(s)
B. Chkdsk
C. Dism
Explanation
chkdsk is short for "Check Disk" and dism stands for "Deployment Image Servicing and Management"
• Dir would show a targeted directory and folders within
• Ipconfig would show the ip configuration for that device
• Format would format a disk
• diskpart would create a disk partition
Of these choices, chkdsk and dism are the only two that perform some measure of troubleshooting tasks related to the mentioned issue.
3.
An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)
Correct Answer(s)
C. Put the terminal server into the router’s DMZ
D. Block all unused ports on the LAN smart switch
Explanation
Putting the terminal server into the router's DMZ and blocking all unused ports on the LAN smart Switch are the most secure options of these five. The DMZ will help block outside access and blocking unused ports allows security measures to focus on active ports, limiting the options for malicious users.
All these options are good, but if you're only going to select two then restricting logon time and enforcing password complexity would only restrict users and make it tougher for a password to be figured out. But after the hacker uses one of many methods to find the password to an admin's account. What is to stop the hacker or at least make it difficult to prevent them from connecting from the outside in the first place?
If you change the default access port, this wouldn't necessarily increase security, just make it more difficult. Same using a local client certificate for server authentication. It's a good option, but that means the device must be connected locally to gain authentication. If the malicious party is already onsite, your server is compromised.
4.
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?
Correct Answer
B. SSH
Explanation
SSH (Secure Shell) is the correct answer because it provides a secure and encrypted method for accessing network devices such as switches and routers. Unlike Telnet, which sends data in clear text, SSH encrypts the data, making it more secure against unauthorized access or eavesdropping. RDP (Remote Desktop Protocol) and VNC (Virtual Network Computing) are used for remote desktop access and control, but they are not typically used for managing network devices. Therefore, SSH is the most appropriate choice for securely accessing the devices in this scenario.
5.
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Select two.)
Correct Answer(s)
C. Default login
F. WEP
Explanation
The default login configuration likely allowed the attack to take place because the attacker was able to gain access to the router using the default login credentials. Additionally, the WEP configuration also likely allowed the attack to take place because WEP is an outdated and weak encryption method that can be easily cracked by attackers.
6.
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.
Which of the following naming convention formats should the technician follow?
Correct Answer
B. Asset ID, MAC address
Explanation
If the naming convention includes a location or IP address, that would be compromising. Option B would be the easiest and individually identifying.
7.
Which of the following provide the BEST security for a server room? (Select two.)
Correct Answer(s)
B. Badge reader
D. Biometric lock
Explanation
Compared to the other options, a Badge Reader and Biometric lock would be the most secure. both would identify the specific user and combined, they would make it even harder to gain access.
8.
Which of the following threats uses personalized information in an attempt at obtaining information?
Correct Answer
D. Spear pHishing
Explanation
*##*Spear phishing is the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. The key to Spear phishing is that it utilizes that personalized data to entice a target.
If you subscribe to a coupon list from your favorite online store and the attacker gains this information. They could send you a fake email as that online store. Mimicking their typical email format, a bank statement, a newsletter, a discount email, a special offer...and then ask you to click a special link.
*##*A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company.
Impersonation attacks are emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data.
Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.
9.
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?
Correct Answer
C. Date and time
Explanation
Making sure the date and time are correct is how the computer knows if a certificate is expired or not. None of these options would interfere in this process as much as an un-adjusted date and time.
10.
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.
Which of the following Control Panel utilities should the technician use to configure the setting?
Correct Answer
D. Internet Options – Connections
11.
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
Correct Answer
B. 4GB
12.
A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in.
Which of the following is the BEST choice for the technician to make?
Correct Answer
B. Ask another technician to take the call
Explanation
You want to perform to the best of your ability while meeting the obligations of your workplace. The best option is to have another technician that is available.
13.
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable.
Which of the following is the BEST method of securing the phone?
Correct Answer
A. Fingerprint lock
Explanation
*##*Fingerprint Locking is the most secure of these 4 options. Biometric security makes it harder while the other options can be brute forced or provide no security.*##*Swipe lock doesn't provide any security.
A PIN can be brute forced easily
A passcode is secure to a point, but it's not as secure as a biometric lock.
14.
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)
Correct Answer(s)
A. UPS
B. Server rack
Explanation
UPS (Uninterruptible Power Supply) and server racks are both devices that are commonly used in data centers or server rooms where the grounding of electrical equipment is crucial for safety and proper functioning. UPS devices often have grounding wires to ensure that any electrical faults are safely directed to the ground. Server racks also typically have grounding wires to prevent static electricity buildup and to protect sensitive equipment from electrical surges. On the other hand, desktop printers, patch panels, and modems are not typically designed with grounding wires as they are not as sensitive to electrical issues as UPS and server racks.
15.
A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.
Which of the following is MOST likely causing this error?
Correct Answer
C. An incompatible partition is marked as active
Explanation
An incompatible partition being marked as active is the most likely cause of the error "No OS found" after installing a secondary OS. When a partition is marked as active, the computer looks for an operating system in that partition during boot. If the partition contains an incompatible OS or no OS at all, the error message is displayed. In this case, the technician has confirmed that the boot.ini file is correct, ruling out other potential causes such as GRUB Legacy, Windows Startup services, or an unsupported version of Windows.
16.
A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?
Correct Answer
D. Require authentication on wake-up
Explanation
This one might be designed to trick you. By default, a guest account won't be in the administrators group. Disabling single sign-on is not going to secure network access. And issuing a default strong password for all users is a good second choice, however, requiring authentication on wake-up would be the most detrimental in a public setting.
Consider this: If the end-user is walking away constantly in this public space, enabling or disabling any other option won't stop a malicious individual from walking up to the PC and then walking away. Unless the user locks their PC and it requires password authentication to wake-up.
17.
Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet.
Which of the following would explain why Joe cannot access his personal shares?
Correct Answer
C. A firewall exception must be set
Explanation
Joe cannot access his personal shares because a firewall exception must be set. This means that the firewall on Joe's company-issued Windows laptop is blocking the connection to his home media server. By setting a firewall exception, Joe can allow the necessary network traffic to pass through the firewall and access his personal shares.
18.
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop.
Which of the following should a technician do to resolve the issue and avoid recurrence?
Correct Answer
E. Remove the user-installed antivirus software
Explanation
Installing multiple real-time protection antivirus software programs can cause conflicts and slow down the performance of the laptop. Removing the user-installed antivirus software will eliminate any conflicts and improve the performance of the laptop.
19.
A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor.
Which of the following operating systems should the technician recommended to ensure the BEST performance on this computer?
Correct Answer
A. Windows 7
Explanation
This is a question meant to trick you into thinking it's a specifications issue. Technically, the user's Windows XP machine meets the minimum 32bit requirements for all 4 versions of Windows. However, it says "upgrade" not Clean Install.
There is not a direct option to upgrade to Windows 8+. But there is an option to upgrade to Windows 7. The difference between upgrading and a clean install would be the loss of files and settings.
20.
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.
Which of the following should the technician do?
Correct Answer
C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time
Explanation
The technician should ask more open-ended questions to try and narrow down the issue. By asking specific questions, the technician can gather more information and potentially identify the problem more efficiently. This approach can help save time by avoiding unnecessary troubleshooting steps that have already been tried by the customer. It also shows the technician's commitment to resolving the issue and addressing the customer's concerns.
21.
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
Correct Answer
A. SSO
Explanation
*##*SSO (Single-Sign On) is the only option that allows an end-user to enter the same username and password once to use for multiple applications.*##*Permission propagation, Inheritance, and MFA (Multi-Factor Authentication) do not offer this option.
22.
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.
Which of the following account types would the technician MOST likely set up on this kiosk machine?
Correct Answer
A. Guest
Explanation
The Administrator and Power User privilege are too much for these users and Remote Desktop User doesn't apply here. Guest is the most likely option.
23.
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license.
Which of the following license type should the technician recommend?
Correct Answer
A. Open license
Explanation
An Open License is the only license that is free.
24.
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS.
Which of the following can Joe do to ensure the backups will work if needed?
Correct Answer
E. Set up alerts to let administrators know when backups fail
Explanation
Joe can set up alerts to let administrators know when backups fail in order to ensure that the backups will work if needed. This will allow the administrators to take immediate action and address any issues or errors with the backups, ensuring that they are functioning properly and can be relied upon for recovery if necessary. By being alerted to backup failures, the IT department can promptly troubleshoot and resolve any problems, minimizing the risk of data loss and maximizing the effectiveness of the backup plan.
25.
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again.
Which of the following recommendations should the contractor give to the customer? (Select two.)
Correct Answer(s)
B. Cloud storage
E. Hot site
Explanation
The contractor should recommend cloud storage as one of the solutions to prevent data loss in the future. Cloud storage allows the customer to store their data remotely, ensuring that even if their hardware is damaged or destroyed, their data will still be accessible. Additionally, the contractor should suggest setting up a hot site, which is a duplicate of the customer's IT infrastructure located in a different geographical area. This way, if the main site is affected by a disaster, the hot site can be activated to ensure business continuity.
26.
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail.
Which of the following is the FIRST option to check?
Correct Answer
B. Look up the error number associated with the failed update
Explanation
When there is an error inside the Windows Update process there is typically a code delivered with the error that allows users o research that specific error.
Visiting the Microsoft Update Website might be the most informal task as you would likely run into Forums or notices but not an actual fix, unless it's a manual workaround. And what information would be used in your search?
If you look at the Event Viewer it would likely supply you with the same error number and when it occurred but not why and how to fix it. So, you will be in the same spot you started.
Manually doing the same task would likely not work.
Instead, if you look up the error number; Microsoft would likely have documentation on what, where, and why. When you look up an error it will take you in the direct path of Microsoft's fix and requirements.
Like reaching into an active Appendix, Microsoft will tell you why or what is causing the issue and tell you what to do next or why it did this. The below example is one such scenario:
If an update meant to fix an error is installed before the update that caused the error. You will get an error that was supposed to be fixed. (I'm not saying this is what that update does, it's a scenario).
In the sequence that happens next, it could detail the options in the correct order.
Find Error Number > Look at Event Viewer to find more information on that failure > Then Visit the Microsoft Update site to see that specific update > Uninstall that last update > And then install the failed update manually.
27.
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?
Correct Answer
C. Folder Options
Explanation
The technician should use the "Folder Options" utility in the Control Panel. This utility allows the user to customize various settings related to folders and files, including the ability to view and modify protected system files. By enabling the option to show hidden files and folders, the technician will be able to locate and edit the protected .dll file that they need.
28.
A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?
Correct Answer
D. Move the infected system to a lab with no network connectivity
Explanation
Identify malware symptoms. << Technician DID THIS
Quarantine infected systems. << THIS IS what the Technician should do next.
Disable System Restore.
Re-mediate: Update antivirus.
Re-mediate: Scan and remove.
Schedule scans and run updates.
Educate the end user.
"Im the Quirky Dr. of the USS Enterprise"
29.
A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem.
Which of the following is a tool the technician can use to resolve the issue?
Correct Answer
A. Task Manager
Explanation
The technician can use Task Manager to resolve the issue. Task Manager allows the technician to view and manage the running processes and applications on the laptop. By closing unnecessary or resource-intensive applications, the technician can reduce the CPU utilization and improve the laptop's performance. However, since the issue persists the next day, there may be underlying factors causing the high CPU utilization that need to be further investigated.
30.
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of up-time in case of extreme weather conditions. Which of the following should a technician recommend?
Correct Answer
A. UPS (Uninterruptible Power Supply)
Explanation
A UPS (Uninterruptible Power Supply) is the correct recommendation in this scenario. A UPS provides battery backup power to devices in the event of a power outage or fluctuation. This will prevent file corruption by allowing the devices to shut down properly without losing any data. Additionally, a UPS can provide at least one hour of uptime during extreme weather conditions, ensuring that critical operations can continue even if the power supply is disrupted. Surge protectors, power strips, and power distribution units do not provide the same level of protection and backup power as a UPS.
31.
A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.
Which of the following built-in utilities should be used?
Correct Answer
A. Time Machine
32.
A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?
Correct Answer
C. Ensure the server is patched with the latest security updates
Explanation
The most important step a technician can take to protect against possible infection is to ensure that the server is patched with the latest security updates. Patching the server with the latest security updates helps to fix any known vulnerabilities or weaknesses in the server's software, making it less susceptible to attacks or infections. This is crucial in maintaining the server's security and protecting it from potential threats, especially when granting remote access to a manager who will be accessing the server after hours and on weekends.
33.
A manager with a restricted user account receives the following error message:
Windows Update cannot currently check for updates because the service is not running.
The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem.
Which of the following should the technician do NEXT?
Correct Answer
B. Restart the network services
Explanation
The technician should restart the network services. This error message indicates that the Windows Update service is not running, which could be due to a network connectivity issue. By restarting the network services, the technician can ensure that the necessary network connections are established and the Windows Update service can function properly. Rebooting the computer may not resolve the underlying network issue, so it is not the best next step. Rolling back device drivers or rebuilding Windows profiles are unrelated to the network services and would not address the problem.
34.
A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: "Access Denied".
The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares.
Which of the following are the MOST likely reasons for these issues? (Select two.)
Correct Answer(s)
B. Mapped drives
D. Denied write/delete permissions
Explanation
The technician moved the data to another server that needs be remapped and also modified to make sure the permissions enable the end-users to access the data properly.
35.
With which of the following types is a man-in-the-middle attack associated?
Correct Answer
B. Spoofing
Explanation
A MITM attack is done using spoofing to mask the attacker as someone trusted.
36.
An employee reported that a suspicious individual was looking through the recycle bin.
Which of the following types of social engineering threats is this?
Correct Answer
C. Dumpster diving
Explanation
Dumpster diving is exactly how it sounds. The individual looks in your waste to find material.
37.
A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning.
A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping.
The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem?
Correct Answer
B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
Explanation
*##*Updating the antivirus software, running a scan, verifying the browser settings are correct along with the hosts file and checking all email settings will provide a better resolution to the problem than changing more settings.*##*What's being described here is a connection issue. Modifying the BIOS and changing the OS is a leap but also not relevant to the immediate issue of the internet. The technician found nothing wrong with the CPU, only slow loading pages and periodic connections dropped.
Sending a test email, running a file system check, and emptying the browser cache isn't necessarily wrong but doesn't seem like something that will resolve the problem.
38.
An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?
Correct Answer
D. Inactive VPN
Explanation
An Inactive VPN is the MOST likely item to inhibit a remote worker.
39.
A network administrator has given a technician documentation detailing the switch-ports the technician will need to patch in for a network upgrade.
Which of the following documents did the network administrator MOST likely give to the technician?
Correct Answer
B. pHysical network diagram
Explanation
The network administrator most likely gave the technician a physical network diagram. This diagram provides a visual representation of the physical layout of the network, including the switch-ports that need to be patched in for the network upgrade. It shows the physical connections between devices, such as switches, routers, and servers, and helps the technician understand how to physically connect the network components. The other options, such as process diagram, fiber backbone diagram, and logical topology diagram, do not specifically provide information about the switch-ports and their physical connections.
40.
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.
When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?
Correct Answer
A. Gpupdate
Explanation
The question is which CMD tool allows a technician to apply a new policy. The only option here that can do that is gpupdate which stands for for group policy update.
41.
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately.
With which of the following types of infections are the PCs MOST likely infected? (Select two.)
Correct Answer(s)
B. Zombies
E. Worm
Explanation
The PCs are most likely infected with Zombies and Worms. Zombies are infected computers that are controlled remotely by an attacker and used to launch DDoS attacks. Worms are self-replicating malware that can spread across a network and infect multiple computers, which aligns with the scenario of multiple internal Windows PCs being the source of the traffic. Both Zombies and Worms can be used as part of a botnet, but the question specifically asks for the types of infections, so Botnet is not a correct answer on its own.
42.
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?
Correct Answer
C. Multi-factor authentication
Explanation
The problem Ann is experiencing is likely due to multi-factor authentication. Multi-factor authentication adds an extra layer of security by requiring users to provide multiple forms of verification, such as a password and a unique code sent to their phone. Since Ann is using a third-party email client, it may not support multi-factor authentication, causing her credentials to be invalid. Resetting her email password would not resolve the issue because the third-party email client still does not support multi-factor authentication.
43.
In which of the following file extension types would a user expect to see the command. “net use T:\\server\files’?
Correct Answer
A. .bat
Explanation
"net use" is a command that you would see in a .bat script or more specifically, CMD prompt.
44.
A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.
Which of the following should the technician replace to prevent these issues in the future?
Correct Answer
D. Battery backup
Explanation
If the battery backup went down during an outage, then that would directly explain the missing time and seemingly the corrupted files/backups.
45.
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?
Correct Answer
C. Disconnect the power before servicing the PC
Explanation
While none of these options are bad, you should not work in a PC still receiving power. That's the absolute first thing to do!
46.
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized.
Which of the following messages will be displayed?
Correct Answer
B. No boot device available
Explanation
The message "No boot device available" will be displayed. This message indicates that the computer is unable to find any device from which it can boot the operating system. Since the hard drive is not recognized, the computer cannot access the necessary files to start up. This could be due to a faulty hard drive or a problem with the connection between the hard drive and the motherboard.
47.
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as un-secure.
Which of the following should the help desk perform to fix the issue?
Correct Answer
B. Ask Ann to open a browser and watch for a redirect page
Explanation
While she shouldn't try to access corporate emails without a VPN, common public access wifi networks keep their networks unsecure but when you connect to their internet your browser will be forced to go to a redirect page in order to register with that network properly. Until Ann does this, she will not be able to have internet access.
48.
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.
Which of the following would the project team MOST likely add to the SOW?
Correct Answer
A. Risk analysis
Explanation
A statement of work (SOW) can be perceived as the same thing as a "Plan to Change". And you should have a Risk analysis before you have a back-out plan so you know what to backup for. And you're not going to ask a Board to approve something without a back out plan and a risk analysis.
Risk Analysis is the answer!
49.
A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.
Which of the following would MOST likely fix the issue?
Correct Answer
A. Roll back updates
Explanation
Rolling back updates would most likely fix the issue because the problem started after the updates were installed. By rolling back the updates, the system will revert to the previous state before the updates were installed, potentially resolving any compatibility issues or bugs that were introduced with the updates.
50.
An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)
Correct Answer(s)
A. Remove applications from startup
B. Defragment the hard drive
Explanation
Removing applications from startup can help improve boot time by reducing the number of programs that need to load during startup. This can be done by accessing the startup folder or using the system configuration utility to disable unnecessary startup programs.
Defragmenting the hard drive can also help improve boot time by organizing fragmented files and optimizing the disk's performance. This can be done using the built-in Disk Defragmenter tool or third-party defragmentation software.