Which of the following should the help desk team recommend the user do in this situation?

A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help...

June 9, 2021 No Comments READ MORE +

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?A . Create a policy to...

June 9, 2021 No Comments READ MORE +

Which of the following should the technician attempt NEXT?

A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?A . Reboot into safe mode and roll back the updatesB ....

June 9, 2021 No Comments READ MORE +

Which of the following OS installation methods provides previously unavailable features and functionality white maintaining user settings?

Which of the following OS installation methods provides previously unavailable features and functionality white maintaining user settings?A . RestoreB . Repair installationC . Clean installD . In-place upgradeView AnswerAnswer: D

June 9, 2021 No Comments READ MORE +

Which of the following would be the MOST effective permissions for someone who is accessing the folder via the share?

A folder has the share permissions of everyone - change, while the folder's NTFS permissions are Set to everyone - read. Which of the following would be the MOST effective permissions for someone who is accessing the folder via the share?A . ReadB . ChangeC . WriteD . ModifyView AnswerAnswer:...

June 8, 2021 No Comments READ MORE +

Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).

Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).A . .vbsB . .txtC . .exeD . .UpE . .batF . .xlsxView AnswerAnswer: A,E

June 8, 2021 No Comments READ MORE +

Which of the following are the MOST likely causes of these issues?

A user calls a technician to report issues when logging in to a vendor’s website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user’s office. The user also informs the technician of strange pop-up...

June 8, 2021 No Comments READ MORE +

Which of the following would be the LEAST expensive solution to protect the user's computer hardware?

A user lives in a location that experiences frequent lightning storms. Which of the following would be the LEAST expensive solution to protect the user's computer hardware?A . A surge protectorB . GroundingC . A power generatorD . An uninterruptible power supplyView AnswerAnswer: B

June 8, 2021 No Comments READ MORE +

Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?

Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?A . AESB . TKIPC . S/MIMED . 3DESView AnswerAnswer: A

June 8, 2021 No Comments READ MORE +

Which of the following are best practices to avoid ESD-related damage when handling internal computer components? (Select TWO.)

Which of the following are best practices to avoid ESD-related damage when handling internal computer components? (Select TWO.)A . Ground onself before touching componentB . Avoid exposing components to source of RFD . Maintain cool and dry air in the work environment.E . Handle cards by their edges to avoid...

June 8, 2021 No Comments READ MORE +