Q11. A technician gets a call from a customer stating that their computer will not boot. They are getting the following error “invalid system disk”. Which of the following should the technician check FIRST? 

A. Verify the operating system is installed correctly. 

B. Verify that all removable drives are empty. 

C. Verify Boot.ini is on the hard drive. 

D. Verify the computer will boot into safe mode. 

Answer:


Q12. A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform? 

A. Secure the workstation in a limited access facility. 

B. Document the incident, purge all policy violating materials. 

C. Immediately delete all unauthorized materials. 

D. Reprimand the user and apply a content filter to their profile. 

Answer:


Q13. A technician is trying to install Windows on a computer. The install process reports there are no storage devices available, but the BIOS shows a hard drive is installed. Which of the following does the technician need to do? 

A. Create a primary partition 

B. Use NTFS 

C. Enable PXE 

D. Install third-party drivers 

Answer:


Q14. In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST? 

A. Use safety goggles 

B. Remove jewelry 

C. Put on an ESD strap 

D. Disconnect power 

Answer:


Q15. A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring? 

A. Configure the server to use a static IP 

B. Logically move the server to the DMZ 

C. Reallocate the server to a different networking closet 

D. Disable the remote desktop port 

Answer:


Q16. An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem? 

A. The cable connected to the network 

B. Virtual host network adapter 

C. USB host adapter 

D. The domain of the virtual machine 

Answer:


Q17. A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be: 

A. a detriment to employer/employee relations. 

B. personally identifiable information. 

C. a violation of information access policies. 

D. proof of employee corporate affiliation. 

Answer:


Q18. Which of the following is a security threat that disguises itself as legitimate software? 

A. Trojan 

B. Worm 

C. Virus 

D. Spyware 

Answer:


Q19. An office manager mistakenly uninstalled a valuable application. Which of the following utilities may allow the manager to correct this issue? 

A. System Restore 

B. Computer Management 

C. Disk Management 

D. System Configuration 

Answer:


Q20. A technician needs to log into a user's computer to fix the user's corrupt local profile. Which of the following connectivity tools will allow the technician to connect to the user’s computer? 

A. Remote Assistance 

B. Virtual Private Network 

C. Computer Management 

D. Remote Desktop 

Answer: