Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?
Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are...
Which of the following should the technician do to remove the threat from the system?
A user is trying to access a popular email website but Is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue. Which of the following should the technician do to remove the threat from the system?A ....
Which of the following best practices should a technician observe to reduce the risk of electrical shock?
Which of the following best practices should a technician observe to reduce the risk of electrical shock?A . Keep components in an antistatic bag.B . Remove metallic jewelryC . Utilize proper cable managementD . Wear an ESD wrist strapView AnswerAnswer: D
Which of the following steps should the technician take NEXT?
A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue...
Which of the following logical security concepts uses 802.1X?
A technician configures a switch for an enterprise to use 802.1X. Which of the following logical security concepts uses 802.1X?A . Access control listB . MAC address filteringC . MDM policiesD . Port securityView AnswerAnswer: A
Which of the following is MOST likely the cause of the issue?
Joe, a user, did not receive emails over the weekend like he usually does. Productivity software is functioning properly. Joe never powers off his computer and typically leaves all applications open. No other users are reporting email issues. Which of the following is MOST likely the cause of the issue?A...
Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?
Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?A . Windows 7B . Windows 8C . Windows 8.1D . Windows 10View AnswerAnswer: A
Which of the following actions should the user take?
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?A . Update antivirus definitionsB . Install anti-malware softwareC . Enable the pop-up blockerD...
Which of the following should the technician do NEXT?
A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following...
Which of the following upgrade methods should the technician use?
A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use?A . network installationB . clean installC . in-place upgradeD . image deploymentView AnswerAnswer: C