Topic 5: Exam Pool E
Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?
A. Professional
B. Home
C. Enterprise
D. Embedded
Explanation: BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices1. BitLocker is available on supported devices running Windows 10 or 11 Pro, Enterprise, or Education2. Windows 10 Home does not support BitLocker3, and Windows 10 Embedded is designed for specialized devices and does not offer BitLocker as a feature4. Therefore, the most appropriate Windows 10 edition for a single user who wants to encrypt a hard drive with BitLocker is Professional. References1: BitLocker overview - Windows Security | Microsoft Learn2: Device encryption in Windows - Microsoft Support3: Can You Turn on BitLocker on Windows 10 Home?4: How to enable device encryption on Windows 10 Home
A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?
A. Corporate
B. Open-source
C. Personal
D. Enterprise
Explanation: Open-source software is software that has its source code available for anyone to inspect, modify, and distribute. Open-source software is usually free of charge and does not require a license to use. Some examples of open-source antivirus software are ClamAV, Comodo, and Immunet12. The other license types are either not free or not suitable for a SOHO PC. Corporate and enterprise licenses are designed for large-scale organizations and networks, and they usually require a subscription fee. Personal licenses are for individual users and may have limited features or support.
A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?
A. Date and time
B. User access control
C. UEFI boot mode
D. Log-on times
Explanation: Date and time is the most likely cause of the issue. The date and time settings on a workstation affect the validity of the certificates used by websites to establish secure connections. If the date and time are incorrect, the workstation may not recognize the certificate as valid and display an invalid certificate error. Other workstations on the same local network may not have this issue if their date and time are correct. User access control, UEFI boot mode, and log-on times are not likely causes of the issue. User access control is a feature that prevents unauthorized changes to the system by prompting for confirmation or credentials. UEFI boot mode is a firmware interface that controls the boot process of the workstation. Log-on times are settings that restrict when a user can log in to the workstation. None of these factors affect the validity of the certificates used by websites.
A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next? Restart the phone.
A. Reimage the OS.
B. Reinstall the application.
C. Clear the cache.
Explanation: Reinstalling the application is the best option to fix the intermittent crashing of the application on the corporate smartphone. Reinstalling the application will ensure that the latest version of the app is installed, which may have bug fixes and compatibility updates that can resolve the crashing issue. Reinstalling the app will also clear any corrupted or outdated data or cache that may cause the app to malfunction. The other options are not as effective or appropriate as reinstalling the app. Restarting the phone may temporarily fix the issue, but it will not address the root cause of the app crashing, which may be related to the app itself or its data. Reimaging the OS is a drastic and unnecessary measure that will erase all the data and settings on the phone and restore it to its factory state. This will also remove all the other apps and files that may be important for the corporate use of the phone. Clearing the cache may help to free up some space and improve the performance of the app, but it will not update the app or fix any bugs that may cause the app to crash.
A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?
A. resmon exe
B. msconfig.extf
C. dfrgui exe
D. msmfo32.exe
Explanation:
The technician should use dfrgui.exe to defragment the hard drive1.
A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?
A. Full
B. Non-parity
C. Differential
D. Incremental
Explanation:
The type of backup that should be completed FIRST after installing a new backup and
recovery system is a full backup. This is because a full backup is a complete backup of all
data and is the foundation for all other backups. After a full backup is completed, other
types of backups, such as differential and incremental backups, can be performed.
A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?
A. Reimage the computer.
B. Replace the system RAM.
C. Reinstall and update the failing software.
D. Decrease the page file size.
A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?
A. Change the DNS address to 1.1.1.1
B. Update Group Policy
C. Add the site to the client's exceptions list
D. Verity the software license is current
Explanation:
The technician should add the update site to the client’s exceptions list to bypass the proxy.
This can be done through the client’s web browser settings, where the proxy settings can
be configured. By adding the update site to the exceptions list, the client will be able to
access the site and download the software update.
A large organization is researching proprietary software with vendor support for a multiuser environment. Which of the following EULA types should be selected?
A. Corporate
B. Perpetual
C. Open-source
D. Personal
Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).
A. Biometric lock
B. Badge reader
C. USB token
D. Video surveillance
E. Locking rack
F. Access control vestibule
Explanation:
A biometric lock requires an authorized user to provide a unique biometric identifier, such
as a fingerprint, in order to gain access to the server room. A badge reader requires an
authorized user to swipe an access card in order to gain access. Both of these methods
ensure that only authorized personnel are able to access the server room. Additionally,
video surveillance and access control vestibules can be used to further secure the server room. Finally, a locking rack can be used to physically secure the servers, so that they
cannot be accessed without the appropriate key.
Page 19 out of 74 Pages |
Previous |