A client reports that their browser's home page changed. Every time they run an internet search, the results are returned from unfamiliar websites. Which of the following actions should a technician take first to resolve the issue? (Select two)
Answer : D, E
Comprehensive and Detailed Explanation From Exact Extract:
The symptoms suggest abrowser hijacker. Thefirst stepsshould be toremove any malicious extensionsandreset the startup pageto restore normal behavior.
FromAll-in-One Exam Guide:
''Browser hijackers often install as extensions and change homepage settings. Removing these extensions and resetting the startup configuration typically resolves the issue.''
When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message ''Cannot reach this page.'' Which of the following should a technician configure?
Answer : B
Comprehensive and Detailed Explanation From Exact Extract:
If internal resources (such as intranet or internal apps) can't be accessed but external sites work, this often points to aDNS issue, where the system isn't resolving internal domain names correctly.
FromAll-in-One Exam Guide:
''When internet access is functional but internal sites fail to load, the issue usually lies with DNS resolution. Internal resources often require internal DNS servers, which may not be configured correctly.''
A developer is using an AI tool to generate a complex sorting algorithm for a web application. Which of the following is the best choice to legally generate code in their application?
Answer : D
The correct answer is D. Check the sources the AI tool is using for copyrighted content, because legal and ethical use of AI-generated code depends on ensuring the output does not violate copyright or licensing restrictions. Developers are responsible for verifying that code used in their applications complies with intellectual property laws.
According to the Quentin Docter -- CompTIA A+ Complete Study Guide, responsible and appropriate use of AI tools includes validating outputs for accuracy, legality, and compliance. AI systems may generate code that resembles copyrighted or licensed material if their training data includes such sources.
The Travis Everett & Andrew Hutz -- All-in-One Exam Guide explains that simply crediting an author or adding comments does not automatically grant legal permission to use copyrighted code. Developers must ensure that the generated code is either original, properly licensed, or permitted for use under open-source or fair-use terms.
The Mike Meyers / Mark Soper Lab Manual reinforces that silently using generated code without verification can expose organizations to legal risk, including copyright infringement claims. Ethical AI usage requires due diligence before deploying generated outputs into production systems.
Because the question asks for the best legal choice, verifying the AI tool's sources and licensing is the most appropriate action, making D the correct answer.
Various alerts on a user's Windows 11 laptop are continually interrupting videoconference calls. Which of the following should a support technician recommend to best solve the issue?
Answer : D
Comprehensive and Detailed Explanation From Exact Extract:
TheDo Not Disturbsetting in Windows Notification settings allows users to suppress all notification banners and sounds during presentations or video calls.
FromTravis Everett -- All-in-One Exam Guide:
''Use Windows 'Do Not Disturb' to prevent notifications from interrupting full-screen apps like video conferencing.''
A business is hiring a remote employee and must provide the employee with graphical interface access to the in-house Linux servers. Which of the following should the business use for this process?
Answer : B
Because the employee needs graphical interface (GUI) access to Linux servers, the best option is VNC (Virtual Network Computing). VNC is specifically designed for remote control and sharing of desktops, meaning it can present the full graphical desktop of the Linux server to the remote user and allow interaction as if they were sitting at the machine. Quentin Docter describes VNC as ''a remote control tool for the sharing of desktops,'' typically using TCP port 5900, and notes it is similar to RDP but is an open-source protocol; it can support encryption via plug-ins (important for secure remote use). Mike Meyers' Lab Manual reinforces the key distinction: SSH provides command-line access, but ''when you need remote access to the full graphical desktop, you need a remote desktop application,'' and many of those use VNC (or RDP).
By contrast, SSH and Telnet are primarily text-console tools (Telnet is also unencrypted/insecure), and WinRM is Windows-focused remote management rather than the standard way to provide GUI access to Linux desktops.
A utility failure causes a workstation to immediately shut down. Which of the following would help prevent this from reoccurring?
Answer : B
A ''utility failure'' means the building's AC power source has dropped out (blackout) or sagged severely, causing the workstation to lose power instantly and shut down. The best way to prevent an immediate shutdown during these events is an Uninterruptible Power Supply (UPS), which contains a battery and can continue supplying AC power long enough to keep the PC running briefly and allow a graceful shutdown. Mike Meyers' Lab Manual states that a UPS ''continues to supply AC power...during both brownouts and blackouts via a battery,'' preventing the computer from instantly losing power when the utility fails. Quentin Docter likewise explains that UPS devices protect against ''power sags and even power outages,'' using stored battery energy so the administrator (or OS integration) can safely shut down rather than crash off.
A surge suppressor protects from spikes, not outages. A redundant PSU only helps if the PSU fails, and Docter notes it cannot keep a system running during a power outage. A line voltage regulator helps stabilize voltage but doesn't provide power when utility power is absent.
An engineer notices that many websites prompt users to input login and payment details. The engineer wants to require the browser to encrypt communications. Which of the following best helps to protect sensitive data?
Answer : D
The correct answer is D. Enabling HTTPS-Only Mode, because HTTPS ensures that all communication between the browser and websites is encrypted using TLS (Transport Layer Security). This protects sensitive information such as usernames, passwords, and payment details from interception.
According to the Quentin Docter -- CompTIA A+ Complete Study Guide, HTTPS encrypts data in transit, preventing attackers from eavesdropping or modifying communications. HTTPS-only modes in modern browsers block or warn users when a site does not support secure connections.
The Travis Everett & Andrew Hutz -- All-in-One Exam Guide emphasizes that HTTPS is essential for protecting authentication credentials and financial information, especially on public or untrusted networks. Enforcing HTTPS-only connections ensures users cannot accidentally submit data over unencrypted HTTP.
The Mike Meyers / Mark Soper Lab Manual clarifies that disabling cookies or JavaScript may break website functionality but does not guarantee encryption. Pop-up blockers address nuisance behavior, not data security.
Because the objective is to encrypt browser communications and protect sensitive data, enabling HTTPS-Only Mode is the most effective and direct solution, making D the correct answer.