After using a third-party disk optimization software package, a technician restarts a laptop and receives the message "No operating system found." The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?
Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?
Which of the following is found in an MSDS sheet for a battery backup?
Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?
A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop technician finds the following information:
Battery charge: 25%
Battery health: 90%
Hotspot: On
Mobile reception: |||
Roaming: Off
Used space: 63.76GB/64GB
Which of the following is the cause of the issue?
A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue. Which of the following should the technician do?
After a user installs a mobile application from an advertisement, the phone's battery dies a few hours later, and it is hot to the touch, even when not in use. Which of the following should a technician do first?
Multiple users clicked a phishing link from a compromised email account. The security team isolates and removes the threat. Then, the management team provides security awareness training to the company. What step is this?
A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?
A technician follows proper malware removal procedures but cannot remove all malware. They decide to reload the OS. What should they select?
Which of the following methods would make data unrecoverable but allow the drive to be repurposed?
Which of the following methods involves requesting a user’s approval via a push notification to verify the user’s identity?
A user is unable to use the latest version of an app on a legacy tablet. What is the most likely reason?
A technician is reviewing an organization's current incident management policy. The organization uses a third-party vendor to protect the organization's assets with multiple tools. Which of the following service types is the organization using?
A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?
A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. What should the technician do first?
A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?
A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate any information. Which of the following command-line tools is the best to troubleshoot the issue?
An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?
A company wants to use a single operating system for its workstations and servers and avoid licensing fees. Which of the following operating systems would the company most likely select?
A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?
A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software to remove a detected threat. The user has been clicking the "X" button in the window frame but it always reappears. The pop-up includes an "OK" button to install the update and remove the threat. Which of the following should the user do next?
A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application. Which of the following should the help desk team do to prevent further unauthorized installations from occurring?
You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.
INSTRUCTIONS
Select the most appropriate statement for each response. Click the send button after each response to continue the chat.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?
What is found in an MSDS (Material Safety Data Sheet) for a battery backup?
Which of the following filesystem types does the Linux OS use?
A technician notices that the weekly backup is taking too long to complete. The daily backups are incremental. Which of the following would most likely resolve the issue?
An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?
A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?
Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?
A user takes an iOS-based smartphone to a repair shop due to performance issues. The technician observes:
Battery charge: 25%
Battery health: 90%
Hotspot: On
Used space: 63.76GB / 64GB
Which of the following is the most likely cause of the performance issue?
Which of the following malware types typically has very high computing resource usage?
A user’s computer is running slowly. Task Manager shows:
Disk: 2%
Network: 12%
GPU: 15%
CPU: 70%
Memory: 97%
Which of the following would a technician most likely do to resolve the issue?
An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide?
An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures further reduces the risk of unauthorized data access?
A technician uses AI to draft a document about new software benefits. Upon reading, the technician sees factually incorrect info. What term best describes this?
A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:
● All endpoints are updated and have the newest EDR signatures.
● Logs confirm that the malware was quarantined by EDR on one system.
● The potentially infected machine was reimaged.
Which of the following actions should the technician take next?
A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer. Which of the following specifications will help the specialist determine which OS architecture to use?
An employee is trying to connect their company laptop to airport Wi-Fi. A pop-up with the airport logo appeared and was closed quickly. The internet does not work. What should a help desk technician suggest?
A user is unable to upload files to the corporate servers from their mobile phone when outside the office, but uploading files works without issue in the office. The user saw an error notification but dismissed it. Which of the following should a technician do to determine the root cause?
Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?
Which of the following is a protocol that provides AAA for network services?
Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the application is not responding. Which of the following would a technician most likely inspect?
What is the next step a technician should take after completing malware cleanup?
A user decides to switch to Windows from Linux and is trying to migrate data using an external USB hard disk. However, when the user connects the cable to the Windows machine, an error message appears stating the device must be formatted before it can be used. The hard disk works as expected when connected to the Linux machine. Which of the following should the user do to resolve this issue?
A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?