Which of the following should the technician implement to ensure maximum uptime of the client VM?
A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs . Which of the following should the technician implement to ensure maximum...
Which of the following would MOST likely be used by an attacker to identify the hash value of a strong password quickly?
Which of the following would MOST likely be used by an attacker to identify the hash value of a strong password quickly?A . Brute forceB . Key stretchingC . Rainbow tableD . Dictionary attackView AnswerAnswer: C
Which of the following should a technician attempt FIRST?
A user reports that an application has been closing unexpectedly for the past two days when posting transactions. When an administrator attempts to access the application, it generates an error stating a data library is missing. Which of the following should a technician attempt FIRST?A . Uninstall and reinstall the...
Which of the following must be enabled to facilitate this capability?
When an employee logs in to a computer, access is automatically granted to all applications . Which of the following must be enabled to facilitate this capability?A . Single sign-onB . Authentication permissionsC . Microsoft Management ConsoleD . Administrator rightsView AnswerAnswer: A Explanation: Reference: https://www.g2.com/articles/what-is-single-sign-on
Which of the following commands would help the technician gain information about the network settings on the machine?
A technician is troubleshooting a network connectivity issue on a Linux workstation . Which of the following commands would help the technician gain information about the network settings on the machine?A . chmodB . grepC . ifconfigD . sudoView AnswerAnswer: C
Which of the following should be performed to remove and prevent any further emails from this organization?
An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for subscribing to an organization’s mailing list . Which of the following should be performed to remove and prevent any...
Which of the following describes the root cause of the issue?
A technician is attempting to resolve an issue with a customer's smartphone. The customer can no longer unlock the smartphone due to an “incorrect pattern" message appearing onscreen, The customer explains that the option to "make pattern visible” is unchecked in the security settings. The customer has also unsuccessfully tried...
Which of the following security tools can leverage the onboard TPM to protect data at rest?
Which of the following security tools can leverage the onboard TPM to protect data at rest?A . Encrypted file systemB . Access control listC . BitLockerD . Secure file transfer protocolView AnswerAnswer: A Explanation: Reference: https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10
Which of the following should the technician use?
A network technician is creating a set of scripts to help complete some common tasks. The technician wants to leave notes within the scripts to explain the purpose of each section and allow for changes later . Which of the following should the technician use?A . Inline commentsB . End-user...
Which of the following commands should the technician use FIRST?
A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share . Which of the following commands should the technician use FIRST?A . pingB . nslookingC . net useD . ipconfigView AnswerAnswer: B