Q1. A user is configuring the email settings on a smartphone. Which of the following configurations will allow the user to synchronize email from multiple devices?
A. IMAP
B. S/MIME
C. POP3
D. SMTP
Answer: A
Q2. In order to prevent other users from editing files in ‘C:\ Files’, which of the following steps should be taken?
A. Set NTFS permissions to read only
B. Set the folder to index files for search
C. Set the local administrator as the owner of the folder
D. Set network share permissions to read only
Answer: A
Q3. A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access?
A. Check the phone for unauthorized root access
B. Disable the phone’s Bluetooth chip
C. Erase all personal data from the phone
D. Check the phone for location tracking
Answer: A
Q4. Which of the following Windows OS capabilities allows modern Windows versions to run applications written for older versions natively?
A. Microsoft Virtual PC
B. Compatibility mode
C. Hyper-V
D. Virtual XP mode
Answer: B
Q5. Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST?
A. Set the application to run in XP compatibility mode
B. Reinstall Windows XP
C. Configure a dual boot with XP and 7
D. Install the application in XP mode
Answer: A
Q6. While navigating a Windows machine through command prompt, which of the following commands will a technician use to display the contents of the current folder?
A. cd
B. dir
C. md
D. rd
Answer: B
Q7. Ann, a user, has brought her laptop in for service. She reports that her battery is at 100%, but whenever it is unplugged it immediately shuts down. Which of the following should the
technician do?
A. Replace the battery
B. Change power settings to balanced
C. Replace the power adapter
D. Enable APM in the BIOS
Answer: A
Q8. A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be:
A. a detriment to employer/employee relations.
B. personally identifiable information.
C. a violation of information access policies.
D. proof of employee corporate affiliation.
Answer: B
Q9. A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the user’s NEXT step in resolving this issue?
A. Configure Wake-on-LAN for the NIC on the Work PC.
B. Configure a firewall exception on the Home PC.
C. Switch the Work PC network from “Work” to “Home”.
D. Disable the Windows firewall on the Home PC.
Answer: B
Q10. A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client’s machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory?
A. Identify the problem
B. Establish a plan of action to resolve the problem
C. Test the theory to determine cause
D. Document findings, actions, and outcomes
Answer: D