Which of the following should the technician suggest NEXT to try to fix the issue?

Ann, an employee, has been trying to use a company-issued mobile device to access an internal fileshare while traveling abroad. She restarted the device due to a mobile OS update, but she is now unable to access company information Ann calls the help desk for assistance, and a technician verifies...

June 11, 2021 No Comments READ MORE +

Which of the following may include the use of a password and a rotating PIN lo access a wireless network?

Which of the following may include the use of a password and a rotating PIN lo access a wireless network?A . RADIUS authenticationB . TKIP authenticationC . Multifactor authenticationD . TACACS authenticationView AnswerAnswer: C

June 11, 2021 No Comments READ MORE +

Which of the following permissions will the administrators group effectively have?

A folder on an NTFS volume has the following permissions enabled for the administrators group: full control, modify, and write. A technician adds a permissions entry to the folder's security settings denying the administrators group write and modify access. Which of the following permissions will the administrators group effectively have?...

June 11, 2021 No Comments READ MORE +

Which of the following should a technician perform to identify and resolve the issue?

A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose two.)A . Run...

June 11, 2021 No Comments READ MORE +

Which of the following should the technician recommend to BEST ensure the data is not compromised if the laptop is lost or stolen?

The Chief Executive Officer (CEO) of an organization frequently travels with sensitive data on a laptop and is concerned the data could be compromised if the laptop is lost or stolen. Which of the following should the technician recommend to BEST ensure the data is not compromised if the laptop...

June 11, 2021 No Comments READ MORE +

Which of the following steps should be taken FIRST to determine the cause of the issue?

A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?A . Uninstall the camera applicationB...

June 11, 2021 No Comments READ MORE +

Which of the following policies is needed?

A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access. Which of the following policies is needed?A . Password policyB . Acceptable use policyC . Regulatory policyD . Compliance policyView AnswerAnswer: B

June 11, 2021 No Comments READ MORE +

Which of the following should a technician use to continue troubleshooting the issue?

Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts lo authenticate to the service. Prior to changing the password, the computer had no communication issues. Which of the following...

June 10, 2021 No Comments READ MORE +

Which of the following describes the purpose of the line beginning with rem?

Given the following batch file: Which of the following describes the purpose of the line beginning with rem?A . CommentB . LoopC . VariableD . StringView AnswerAnswer: B

June 10, 2021 No Comments READ MORE +

To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?

A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?A . Default gatewayB . Proxy serverC ....

June 10, 2021 No Comments READ MORE +