1. A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?
A) A. Unattended installation B) B. Refresh upgrade C) C. Clean installation D) D. In-place upgrade
2. Which of the following is the MOST secure wireless security protocol?
A) A. AES B) B. WPA C) C. WPA2 D) D. WEP
3. Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?
A) A. Files disappearing B) B. File permission changes C) C. Application crash D) D. Too many startup items
4. Corporate management is concerned about the security of the company-s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)(Select 2answers)
A) A. Use full device encryption B) B. Enable a pattern lock C) C. Implement remote wipe features D) D. Use device lockout policies E) E. Require complex administrator passwords F) F. Disable unknown application installations
5. A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?
A) A. Provide documentation of the repair to the customer B) B. Allow the customer to voice concerns and post the story to social media later C) C. Inform the customer the job is done and return to the office D) D. Defend each step and why it was necessary
Leave a comment