Topic 5: Exam Pool E
A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?
A. EFS
B. GPT
C. MBR
D. FAT32
Explanation: GPT is the correct answer for this question. GPT stands for GUID Partition Table, and it is a partition style that supports up to 128 primary partitions and up to 18 exabytes of disk size per partition. GPT also uses a unique identifier for each partition and provides better data protection and recovery. GPT is suitable for partitioning a hard disk that has five primary partitions with 4TB of free space each. EFS, MBR, and FAT32 are not correct answers for this question. EFS stands for Encrypting File System, and it is a feature that allows encrypting files and folders on NTFS volumes. EFS is not a partition style, but rather a file system attribute. MBR stands for Master Boot Record, and it is an older partition style that supports up to four primary partitions and up to 2TB of disk size per partition. MBR cannot handle five primary partitions with 4TB of free space each. FAT32 stands for File Allocation Table 32, and it is a file system that supports up to 32GB of disk size per partition and up to 4GB of file size. FAT32 is not a partition style, but rather a file system type.
Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team implement?
A. SSH
B. VNC
C. VPN
D. RDP
Explanation: A VPN (Virtual Private Network) is a service that allows remote employees to access the company’s network resources securely over the internet as if they were on premises. A VPN encrypts the data traffic between the employee’s device and the VPN server, and assigns the employee a virtual IP address that belongs to the company’s network. This way, the employee can access the local servers, files, printers, and other resources without exposing them to the public internet. A VPN also protects the employee’s privacy and identity by masking their real IP address and location.
When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?
A. Have the user provide a callback phone number to be added to the ticket
B. Assign the ticket to the department's power user
C. Register the ticket with a unique user identifier
D. Provide the user with a unique ticket number that can be referenced on subsequent calls.
Explanation:
The technician should provide the user with a unique ticket number that can be referenced
on subsequent calls to make sure the ticket is associated with the correct user. This is
because registering the ticket with a unique user identifier, having the user provide a
callback phone number to be added to the ticket, or assigning the ticket to the department’s
power user will not ensure that the ticket is associated with the correct user2.
An engineer is configuring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?
A. Image deployment
B. Recovery partition installation
C. Remote network installation
D. Repair installation
An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?
A. Uninstall and reinstall the application
B. Reset the phone to factory settings
C. Install an alternative application with similar functionality
D. Clear the application cache
Explanation: The systems administrator should clear the application cache12. If clearing the application cache does not work, the systems administrator should uninstall and reinstall the application12. Resetting the phone to factory settings is not necessary at this point12. Installing an alternative application with similar functionality is not necessary at this point12.
Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?
A. APFS
B. FAT32
C. NTFS
D. ext4
A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?
A. WPA2 with TKIP
B. WPA2 with AES
C. WPA3withAES-256
D. WPA3 with AES-128
Explanation:
This is because WPA2 with AES is the most secure wireless network configuration that is
available on a ten-year-old SOHO wireless router.
A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?
A. Have the user consider using an iPad if the user is unable to complete updates
B. Have the user text the user's password to the technician.
C. Ask the user to click in the Search field, type Check for Updates, and then press the Enter key
D. Advise the user to wait for an upcoming, automatic patch
Explanation:
The technician should guide the user to update Windows through the built-in "Check for
Updates" feature. This can be done by having the user click in the Search field, type
"Check for Updates", and then press the Enter key. This will bring up the Windows Update function, which will search for any available updates and give the user the option to install
them.
A technician wants to install Developer Mode on a Windows laptop but is receiving a "failed to install package" message. Which of the following should the technician do first?
A. Ensure internet connectivity.
B. Check for Windows updates.
C. Enable SSH.
D. Reboot computer.
Explanation: Developer Mode on Windows 10 is a feature that allows developers to test and debug their applications on their devices, as well as sideload apps and access other developer tools12. To enable Developer Mode, the user needs to go to the Settings app, select Update & Security, choose For Developers, and switch to Developer Mode123. However, enabling Developer Mode requires internet connectivity, as Windows will download and install a package of features, such as Windows Device Portal and SSH services, that are necessary for Developer Mode124. If the user does not have internet connectivity, they will receive a “failed to install package” message when trying to enable Developer Mode4. Therefore, the first thing that the technician should do is to ensure that the laptop has internet access, either through Wi-Fi or Ethernet, and then try to enable Developer Mode again4
A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?
A. Multifactor authentication will be forced for Wi-Fi
B. All Wi-Fi traffic will be encrypted in transit
C. Eavesdropping attempts will be prevented
D. Rogue access points will not connect
Explanation:
Multifactor authentication will be forced for Wi-Fi after deploying a client certificate to be
used for Wi-Fi access for all devices in an organization3.
Page 17 out of 74 Pages |
Previous |