Which of the following connection protocols should the technician use?
A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?A . TelnetB ....
Which of the following methods would the technician MOST likely perform on the computer?
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?A . Unattended installationB . Refresh...
Which of the following is the MOST likely cause of the issue?
A customer recently upgraded from Windows 7 to Windows 10. The customer lost access to certain network shares, and the system keeps preventing the user's access. Which of the following is the MOST likely cause of the issue?A . The BitLocker feature was activated and encrypted the shares.B . The...
To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?
A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?A . Default gatewayB . Proxy serverC ....
Which of the following protocols should the administrator ensure is enabled on the router?
A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?A . RDPB . SSHC . TFTPD . HTTPView AnswerAnswer: B
Which of the following should the technician do to remove the threat from the system?
A user is trying to access a popular email website but Is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue. Which of the following should the technician do to remove the threat from the system?A ....
After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?
A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?A . Download and...
Windows of the following should a technician perform FIRST to diagnose the issue properly?
A user’s mobile device is losing its battery change very quickly. The user report charge at 9:00 a.m. but has 22% battery by 1:00 p.m. The user has installed several applications, and the phone is relatively new, high-end phon. The user claims most of the usage involves checking emails for...
Which of the following is an authentication protocol that can be used for users in the field?
Which of the following is an authentication protocol that can be used for users in the field?A . WEPB . WPA2C . RADIUSD . TKIPView AnswerAnswer: C
Which of the following steps should be performed prior to traveling to prevent further infection?
A technician was alerted by IT security of a potentially infected desktop, which is at a remote location. The technician will arrive on site after one hour. Which of the following steps should be performed prior to traveling to prevent further infection? (Select TWO)A . Start system updates.B . Backup...