Q1. A technician is working on a user’s PC. After testing the theory of the cause, which of the following could the technician perform NEXT? (Select TWO).
A. Resolve issue
B. Inform user
C. New theory or escalate
D. Document issue
E. Verify system functionality
Answer: A,C
Q2. A user tries to connect to the Internet using a dial-up modem and receives a “No dial tone detected” message. Which of the following is the FIRST thing the technician should check to troubleshoot the issue?
A. Check if the cable is connected on the modem’s phone RJ-45 port.
B. Check if the cable is connected on the modem’s line RJ-11 port.
C. Check if the cable is connected on the modem’s line RJ-45 port.
D. Check if the cable is connected on the modem’s phone RJ-11 port.
Answer: B
Q3. Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?
A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.
Answer: C
Q4. On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?
A. Content Advisor
B. Proxy Settings
C. Network Drive Mapping
D. Local Security Policy
Answer: B
Q5. A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?
A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.
Answer: C
Q6. Which of the following is a security threat that disguises itself as legitimate software?
A. Trojan
B. Worm
C. Virus
D. Spyware
Answer: A
Q7. A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent?
A. Measured service
B. Rapid elasticity
C. On-demand
D. Resource pooling
Answer: A
Q8. When securing a mobile device, which of the following types of screen locks is the MOST secure?
A. Fingerprint lock
B. Swipe lock
C. Passcode lock
D. Face lock
Answer: A
Q9. A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?
A. TRACERT
B. NETSTAT
C. IPCONFIG
D. NSLOOKUP
Answer: A
Q10. An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?
A. The HIPS device is blocking the messages
B. The access control list is blocking the messages
C. The email filter has quarantined the messages
D. The firewall is blocking the sender’s email address
Answer: C