A consultant is looking to consolidate six company servers onto one physical system. Which of the following requirements is MOST important on the new setup to ensure stable functionality of the virtual environment?


A.      Client hardware requirements

B.      Server software security requirements

C.      Server hardware resources

D.      Network resources


Correct Answer: C




Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?


A.      Deny all

B.      Allow all

C.      Most privilege

D.      Least privilege


Correct Answer: D




A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of video during operation. Which of the following are MOST likely causes of this problem? (Select TWO).


A.      Integrated system video chip is failing and/or near death.

B.      Video drivers were not installed directly from Microsoft update.

C.      Incompatible or untested video drivers have been installed.

D.      The BIOS is not set for the proper operation temperature of the video chipset.

E.       The BIOS is underclocking the video card’s operating speed.


Correct Answer: AC




A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company’s content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?


A.      Anti-malware software

B.      Factory pre-installation

C.      System restore

D.      Recovery console


Correct Answer: A




After being infected with a virus, a user’s computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user’s backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?


A.      Recovery Console

B.      Factory restore CD

C.      Anti-malware software

D.      System Restore


Correct Answer: B




A technician installed a second hard drive in a computer. Upon restart, a message appears stating. “primary drive 0 not found. Press F1 to continue.” Which of the following should the technician check FIRST?


A.      That NTLDR and boot.ini are not missing

B.      Proper drive installation (e.g. cables/jumpers)

C.      If computer can boot into safe mode

D.      If the BIOS boot settings are correct


Correct Answer: B




The shared folder named C$ is an example of which of the following?


A.      Local share

B.      Permission propagation

C.      Inheritance

D.      Administrative share


Correct Answer: D




Which of the following is BEST used to prevent other people from viewing a user’s computer screen?


A.      Anti-virus software

B.      Key fob

C.      Biometric device

D.      Privacy filter


Correct Answer: D




A pest exterminator tries to gain access to a company’s computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?


A.      War driving

B.      Social engineering

C.      Shoulder surfing

D.      Phishing


Correct Answer: B




Which of the following can be used as an appropriate boot device?


A.      USB drive

B.      HDMI

C.      OEM recovery media

D.      FDISK


Correct Answer: A



Comments are closed.