You are working from home over a weekend to resolve a backlog of employee help desk tickets. A user issue requires you to access their Windows 11 computer in the home office to check its settings. You have verified that the machine is available, but the user is not present.
Which remote access application is best suited for this task?
Answer : C
Which type of virtualization allows a user to run one or multiple operating systems that are stored remotely on a central server in a data center?
Answer : D
Desktop virtualization (also known as Virtual Desktop Infrastructure, or VDI) enables users to run one or more operating systems that reside on a centralized server in a data center, delivering the desktop environment over the network.
A user calls help desk to report that they cannot connect to the company's internal WiFi network.
The help desk technician is following the problem-solving process to resolve the user's issue. After defining the problem and gathering detailed information, the technician suspects the most probable cause of the issue is a misconfiguration in the user's network settings.
What should the technician do next?
Answer : D
According to the standard troubleshooting process, after you establish a probable cause you must test that theory before implementing any changes. Checking if other users are affected helps confirm whether the issue is isolated to the one user's settings (supporting your misconfiguration theory) or is a broader network problem.
You are a help desk technician at Healthy Eats. The company has 1000 employees in multiple locations. An end user calls you via telephone and states the following:
I am Jane Doe with the Accounting Department. I have forgotten my password, and I have a huge deadline approaching. I need you to reset my password as soon as possible so that payroll checks can be issued.
What should you do?
Answer : C
Before performing a privileged action like a password reset, you must verify the caller's identity. Calling Jane Doe's manager at a known company number ensures proper authentication.
John indicates that he cannot edit the file Test.docx, which is stored on a network shared drive. John can access and edit other files on the shared drive. You review permissions for the file and see the permissions shown in the following screenshot.

Which change will allow John to access and edit the Test.docx file, while retaining account-level control?
Answer : B
The screenshot shows that John Douglas is explicitly denied 'Read & execute' permissions on the file Test.docx, which overrides any inherited allow permissions. To allow John to edit the file, you must modify the NTFS permissions on the file and remove or change the Deny rule that applies to his account. Simply allowing 'read & execute' would not be enough; you must grant 'Modify' or higher and remove the Deny.
A customer calls the Help Desk and reports the following:
I keep getting an error that my system is low on memory when I run my video editing software.
Which process will allow the customer to locate the available memory of their device?
Answer : B
Task Manager's Performance tab provides real-time details on total, used, and available RAM, allowing the user to see memory availability.
You receive an email from a user with the display name of the President of your company. The email requests that you do them a favor and purchase gift cards and send the gift cards to an email address provided.
What should you do?
Answer : C
This scenario is a classic example of email spoofing and a social engineering attack. You should contact the IT department immediately using internal communication methods to verify the legitimacy of the request. Never respond or take action based on suspicious emails.