Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?
An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?
An end user ' s laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again. Which of the following should the technician do next?
Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. What should the help desk management implement?
A company wants to perform an in-place upgrade of operating systems on all workstations. All types of removable storage are disabled for security reasons. Which of the following is the best way to upgrade while keeping security settings in place?
An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?
A user created a document using online collaboration tools, and the document is not available on their laptop now. Which of the following should a desktop technician do to remediate the issue?
A senior administrator asks a help desk technician to run a set of commands on a remote network switch. After running the commands, the technician needs to collect the output and provide it to the administrator. Which of the following should the technician use to fulfill the administrator ' s request?
A project team needs special access on a shared repository to add new content, edit existing content, and prevent content deletion. Which of the following should an administrator do to configure this setup with the least amount of effort?
Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?
Why would a network engineering team provide a help desk technician with IP addresses for a wired network segment?
A technician is selecting a remote access method so users can securely access Linux and Windows servers when working from home. Which of the following should the technician choose to best meet this requirement?
Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?
A technician follows proper malware removal procedures but cannot remove all malware. They decide to reload the OS. What should they select?
A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).
A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue. Which of the following should the technician do?
After using a third-party disk optimization software package, a technician restarts a laptop and receives the message “No operating system found.†The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?
A technician is setting up a surveillance system for a customer. The customer wants access to the system ' s web interface on the LAN via the system’s IP address. Which of the following should the technician use to prevent external log-in attempts from the internet?
An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?
A technician needs to install an operating system on a large number of workstations. Which of the following is the fastest method?
A help desk technician recently installed an SSH client on a workstation in order to access remote servers. What does this enable?
Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method. Which of the following technologies should the technician use?
A popular game frequently freezes and crashes on a mobile phone. The user updates the OS, but the issue persists. The device is one year old and has plenty of free storage space. Which of the following is the most appropriate first step to troubleshoot this issue?
After a user installs a mobile application from an advertisement, the phone ' s battery dies a few hours later, and it is hot to the touch, even when not in use. Which of the following should a technician do first?
Which of the following file types allows macOS users to uninstall software completely by placing the file in the trash?
A user is renaming a .txt file to a .xml file. After renaming the file, Windows Explorer shows the filename as Document….xml. However, the document properties show the type of file as Text Document (.txt). Which of the following controls enables the user to correctly change the file type?
You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.
INSTRUCTIONS
Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.
Then, click the + sign to place each device in its appropriate location.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Wireless AP LAN

Firewall Screened Subnet


Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.
INSTRUCTIONS
Click on individual tickets to see the ticket details, and view applicable attachments to
determine the problem.
Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most
efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper
command or verification to remediate or confirm your fix of the issue from the
' Verify/Resolve ' drop-down menu.

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.
INSTRUCTIONS
Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.
Multiple devices may be selected for quarantine.
Click on a host or server to configure services.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.











A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully
use the Testing program.
INSTRUCTIONS
Review the information in each tab to verify the results of the deployment and resolve
any issues discovered by selecting the:
· First command to resolve the issue
· Second command to resolve the issue



Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.
INSTRUCTIONS
Click on individual tickets to see the ticket details, and view applicable attachments to
determine the problem.
Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most
efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper
command or verification to remediate or confirm your fix of the issue from the
' Verify/Resolve ' drop-down menu.

As a corporate technician, you are asked to evaluate several suspect email messages on a client ' s computer. Corporate policy requires the following:
> All phishing attempts must be reported.
> Future spam emails to users must be prevented.
INSTRUCTIONS
Review each email and perform the following within the email:
> Classify the emails
> Identify suspicious items, if applicable, in each email
> Select the appropriate resolution
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.






You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.
INSTRUCTIONS
Select the most appropriate statement for each response. Click the send button after each response to continue the chat.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

After a user installs a mobile application from an advertisement, the phone ' s battery dies a few hours later and becomes hot to touch, even when not in use. Which of the following should a technician do first?
An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?
A utility failure causes a workstation to immediately shut down. Which of the following would help prevent this from reoccurring?
A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found. Which of the following actions is the best way to resolve this issue?
A user is trying to install new software. The application downloads successfully, but when the user attempts to install it, the user receives a prompt for credentials. Which of the following would the technician most likely do to resolve this issue?
Which of the following is an example of an application publisher including undisclosed additional software in an installation package?