Assesment
A user with tech knowledge and some access permissions browses the network to identify any available
shares on all servers. While browsing, the user tried to find a share containing payroll information. They
know the share name is 'payroll' however they are not able to find it when searching. Assuming the user
is authorized to access the payroll information, what is the most likely reason why the user cannot view
the information within the share? ANS: The share is a hidden share
A technician is troubleshooting a Windows system using the command prompt and is currently in the
directory C:\Backup. They need to navigate to the subdirectory 02102022 within C:\Backup. Which
command should they use to enter the subdirectory directly? ANS: cd 02102022
A Windows user is not able to resolve server names on a local network. After updating the system's
hosts file, which command does the user issue? ANS: ipconfig /flushdns
A Windows 10 computer user requires help from the IT department. A technician provides a passcode to
the user and connects over port 443. What type of Windows help session does the user create when
using CTRL+START+Q? ANS: Microsoft Quick Assist
A user wishes to enable multiple desktops within macOS for different work environments. What feature
makes this possible? ANS: Mission Control
A user opens a help desk ticket after seeing that a company video, embedded within a particular internal
webpage, is not displaying as it should. What does a support technician conclude to be the most likely
issue? ANS: A plugin
A user claims that they cannot browse the local shared network by name. After evaluating the
computer's IP settings and pinging the local share by IP address with no problem, what does a support
technician determine as the cause? ANS: Missing DNS address
, A security engineer suggests the use of proximity technology to track the movement of portable
equipment. What solution does the engineer recommend? ANS: Radio frequency
A computer security team investigates a high-level computer breach at a large company. While
investigating one of the computers in question, the team found that computer equipment was
improperly secured, causing the equipment to be passed around during the investigation with no
tracking. With respect to digital forensics, what are the primary concerns for the team from this
discovery? (Select all that apply.) ANS: Chain of custody
Data integrity
An attacker uses a Windows-native script to create fileless malware that requires no compilation. What
scripting environment does the attacker utilize? ANS: PowerShell
A user inspects and learns about the electrical components on the inside of a computer. What is
measured in ohms? ANS: Resistance
A systems engineer would like to keep a company's wireless network a secret. How can the engineer
accomplish this? ANS: Disable service set ID broadcast
What might a security engineer suggest as a solution to deter lunchtime attacks? ANS: Policies
A new support technician works on entry-level trouble tickets. Which question does the technician use
as a closed type of question? ANS: Did you read the message?
A user builds a new computer for gaming purposes. The ability to upgrade the performance graphics
processing unit (GPU) over time is desired. What GPU type does the user invest in? ANS: Dedicated
graphics
A user would like to install an updated Windows operating system (OS) on a computer. What options
does the user have to accomplish this? (Select all that apply.) ANS: Clean install