A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?A . Unattended installationB . Refresh upgradeC . Clean installation...Continue reading
A customer recently upgraded from Windows 7 to Windows 10. The customer lost access to certain network shares, and the system keeps preventing the user’s access. Which of the following is the MOST likely cause of the issue?A . The BitLocker feature was activated and encrypted the shares.B . The user’s information was not...Continue reading
A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?A . Default gatewayB . Proxy serverC . WINS serverD . DHCP...Continue reading
A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?A . RDPB . SSHC . TFTPD . HTTP View Answer Answer: B...
A user is trying to access a popular email website but Is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue. Which of the following should the technician do to remove the threat from the system?A . Remove all parameters after...Continue reading
A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?A . Download and apply the security patch...Continue reading
A user’s mobile device is losing its battery change very quickly. The user report charge at 9:00 a.m. but has 22% battery by 1:00 p.m. The user has installed several applications, and the phone is relatively new, high-end phon. The user claims most of the usage involves checking emails for a few minutes three...Continue reading
Which of the following is an authentication protocol that can be used for users in the field?A . WEPB . WPA2C . RADIUSD . TKIP View Answer Answer: C...
A technician was alerted by IT security of a potentially infected desktop, which is at a remote location. The technician will arrive on site after one hour. Which of the following steps should be performed prior to traveling to prevent further infection? (Select TWO)A . Start system updates.B . Backup PC dataC . Run...Continue reading
After connecting to the corporate VPN, a user’s workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly. Which of the following should the technician do NEXT?A . Verify the browser’s proxy configuration settingsB . Instruct the user to...Continue reading