1.
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
2.
A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?
3.
A user's mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and sees the following: Which of the following should be changed to resolve this issue?
4.
A Windows user is attempting to install a local printer and is unsuccessful based on permissions. Which of the following user types BEST describes this user?
5.
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the Internet. Which of the following actions should the user take?
6.
A desktop technician is attempting to upgrade several machines to Windows 10. After realizing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?
7.
A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the machine are:
Two 1GHz CPUs
2GB of memory
15GB hard drive
800
8.
A technician is installing the latest OS on a user's system. The user wants all of the settings and files to remain intact during the installation. Which of the following upgrade methods should the technician use?
9.
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?
10.
Which of the following techniques is used by malicious employees to obtain user passwords?