Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray: There are 1033 infected files on this computer. Click here to disinfect. The link is blocked by the corporate content filter and...

June 4, 2021 No Comments READ MORE +

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)A . UPSB . Server rackC . PoE phoneD . Desktop printerE . ModemF . Patch panelView AnswerAnswer: A,B

June 3, 2021 No Comments READ MORE +

Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?

Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?A . Local AdministratorB . Standard UserC . Power UserD . Guest UserView AnswerAnswer: D

June 3, 2021 No Comments READ MORE +

Which of the following should be put in place to address the company’s concerns?

Accompany is concerned about the amount of time employees spend browsing the Internet for personal purposes. Which of the following should be put in place to address the company’s concerns?A . Acceptable use policyB . Stateful firewallC . Video surveillanceD . Logon time restrictionsView AnswerAnswer: A

June 3, 2021 No Comments READ MORE +

Which of the following would MOST likely prevent a recurrence of the same malware?

A technician is cleaning malware on a Windows workstation. Which of the following would MOST likely prevent a recurrence of the same malware?A . Enable Shadow Copy.B . Disable System Restore.C . Update root certificatesD . Modify file permissionsView AnswerAnswer: B

June 3, 2021 No Comments READ MORE +

Which of the following tools would the technician MOST likely use?

A help desk technician needs to make administrative changes securely on a remote user's machine. The user must be logged off when the changes are made. Which of the following tools would the technician MOST likely use?A . RDPB . Virtual network computingC . Microsoft Remote AssistanceD . SFTPView AnswerAnswer:...

June 3, 2021 No Comments READ MORE +

Which of the following ‘should the technician perform to accomplish this task?

A technician needs to install Windows 10 on a 4TB hard drive,. Which of the following ‘should the technician perform to accomplish this task?A . Format the drive to use exFAC . Configure the drive to use the GPE . ‘Configure the drive to usé an MBG . Format the...

June 3, 2021 No Comments READ MORE +

Which of the following should be changed to resolve this issue?

A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following: Which of the following...

June 3, 2021 No Comments READ MORE +

Joe, a user, notices someone use his computer while he was on break, Joe’s browser history reveals searches for websites he did not visit. The local print also has document in the output tray with someone else’s PII.

Joe, a user, notices someone use his computer while he was on break, Joe’s browser history reveals searches for websites he did not visit. The local print also has document in the output tray with someone else’s PII. Which of the following steps should Joe take to prevent unauthorized access...

June 3, 2021 No Comments READ MORE +

Which of the following would be the LEAST expensive solution to protect the user's computer hardware?

A user lives in a location that experiences frequent lightning storms. Which of the following would be the LEAST expensive solution to protect the user's computer hardware?A . A surge protectorB . GroundingC . A power generatorD . An uninterruptible power supplyView AnswerAnswer: B

June 3, 2021 No Comments READ MORE +