Topic 5: Exam Pool E
Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?
A. Professional
B. Home
C. Enterprise
D. Embedded
Explanation: BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices1. BitLocker is available on supported devices running Windows 10 or 11 Pro, Enterprise, or Education2. Windows 10 Home does not support BitLocker3, and Windows 10 Embedded is designed for specialized devices and does not offer BitLocker as a feature4. Therefore, the most appropriate Windows 10 edition for a single user who wants to encrypt a hard drive with BitLocker is Professional. References1: BitLocker overview - Windows Security | Microsoft Learn2: Device encryption in Windows - Microsoft Support3: Can You Turn on BitLocker on Windows 10 Home?4: How to enable device encryption on Windows 10 Home
A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?
A. Corporate
B. Open-source
C. Personal
D. Enterprise
Explanation: Open-source software is software that has its source code available for anyone to inspect, modify, and distribute. Open-source software is usually free of charge and does not require a license to use. Some examples of open-source antivirus software are ClamAV, Comodo, and Immunet12. The other license types are either not free or not suitable for a SOHO PC. Corporate and enterprise licenses are designed for large-scale organizations and networks, and they usually require a subscription fee. Personal licenses are for individual users and may have limited features or support.
A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?
A. Date and time
B. User access control
C. UEFI boot mode
D. Log-on times
Explanation: Date and time is the most likely cause of the issue. The date and time settings on a workstation affect the validity of the certificates used by websites to establish secure connections. If the date and time are incorrect, the workstation may not recognize the certificate as valid and display an invalid certificate error. Other workstations on the same local network may not have this issue if their date and time are correct. User access control, UEFI boot mode, and log-on times are not likely causes of the issue. User access control is a feature that prevents unauthorized changes to the system by prompting for confirmation or credentials. UEFI boot mode is a firmware interface that controls the boot process of the workstation. Log-on times are settings that restrict when a user can log in to the workstation. None of these factors affect the validity of the certificates used by websites.
A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next? Restart the phone.
A. Reimage the OS.
B. Reinstall the application.
C. Clear the cache.
Explanation: Reinstalling the application is the best option to fix the intermittent crashing of the application on the corporate smartphone. Reinstalling the application will ensure that the latest version of the app is installed, which may have bug fixes and compatibility updates that can resolve the crashing issue. Reinstalling the app will also clear any corrupted or outdated data or cache that may cause the app to malfunction. The other options are not as effective or appropriate as reinstalling the app. Restarting the phone may temporarily fix the issue, but it will not address the root cause of the app crashing, which may be related to the app itself or its data. Reimaging the OS is a drastic and unnecessary measure that will erase all the data and settings on the phone and restore it to its factory state. This will also remove all the other apps and files that may be important for the corporate use of the phone. Clearing the cache may help to free up some space and improve the performance of the app, but it will not update the app or fix any bugs that may cause the app to crash.
A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?
A. resmon exe
B. msconfig.extf
C. dfrgui exe
D. msmfo32.exe
Explanation:
The technician should use dfrgui.exe to defragment the hard drive1.
A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?
A. Full
B. Non-parity
C. Differential
D. Incremental
Explanation:
The type of backup that should be completed FIRST after installing a new backup and
recovery system is a full backup. This is because a full backup is a complete backup of all
data and is the foundation for all other backups. After a full backup is completed, other
types of backups, such as differential and incremental backups, can be performed.
A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?
A. Reimage the computer.
B. Replace the system RAM.
C. Reinstall and update the failing software.
D. Decrease the page file size.
A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?
A. Change the DNS address to 1.1.1.1
B. Update Group Policy
C. Add the site to the client's exceptions list
D. Verity the software license is current
Explanation:
The technician should add the update site to the client’s exceptions list to bypass the proxy.
This can be done through the client’s web browser settings, where the proxy settings can
be configured. By adding the update site to the exceptions list, the client will be able to
access the site and download the software update.
A large organization is researching proprietary software with vendor support for a multiuser environment. Which of the following EULA types should be selected?
A. Corporate
B. Perpetual
C. Open-source
D. Personal
Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).
A. Biometric lock
B. Badge reader
C. USB token
D. Video surveillance
E. Locking rack
F. Access control vestibule
Explanation:
A biometric lock requires an authorized user to provide a unique biometric identifier, such
as a fingerprint, in order to gain access to the server room. A badge reader requires an
authorized user to swipe an access card in order to gain access. Both of these methods
ensure that only authorized personnel are able to access the server room. Additionally,
video surveillance and access control vestibules can be used to further secure the server room. Finally, a locking rack can be used to physically secure the servers, so that they
cannot be accessed without the appropriate key.
Which of the following is used to ensure users have the appropriate level of access to perform their job functions?
A. Access control list
B. Multifactor authentication
C. Least privilege
D. Mobile device management
Explanation: Least privilege is the principle that is used to ensure users have the appropriate level of access to perform their job functions. Least privilege means granting users only the minimum amount of access rights and permissions they need to perform their tasks, and nothing more. Least privilege reduces the risk of unauthorized access, data leakage, malware infection, or accidental damage by limiting what users can do on the system or network. Access control list, multifactor authentication, and mobile device management are not principles, but rather mechanisms or methods that can implement least privilege. Access control list is a list that specifies the users or groups that are allowed or denied access to a resource, such as a file, folder, or printer. Multifactor authentication is a method that requires users to provide two or more pieces of evidence to prove their identity, such as a password, a token, or a biometric factor. Mobile device management is a tool that allows managing and securing mobile devices, such as smartphones or tablets, that are used by employees to access corporate data or applications.
A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?
A. Time drift
B. Dual in-line memory module failure
C. Application crash
D. Filesystem errors
Explanation:
The most likely cause of the issue is a “time drift”. Time drift occurs when the clock on a
computer is not synchronized with the clock on the domain controller. This can cause
authentication problems when a user tries to log in to the domain. The fact that the
technician is unable to browse to the secure intranet site to get troubleshooting tools
suggests that there may be a problem with the network connection or the firewall settings
on the desktop PC12.
Page 16 out of 62 Pages |
Previous |