In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).
In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).A . A new IT policy requires users to set up a lock screen PIN. B. A user is overseas and wants to use a compatible international SIM Card. C. A user left the phone...
Which pf the following actions is the FIRST step the technician should take?
A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file extension Which pf the following actions is the FIRST step the technician should take?A . Runa live disk clone. B. Run a...
Which of the following tools should the help desk technician use to remove the malicious software?
A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO). A. File Explorer B. User Account Control C. Windows Backup and Restore D. Windows Firewall E. Windows...
Which of the following would BEST mitigate this threat?
The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?A . Encryption at rest B. Account lockout C. Automatic screen lock D. AntivirusView AnswerAnswer: B Explanation:...
Which of the following types of malware is the system MOST likely infected with?
A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%. Which of the following types of malware is the system MOST likely infected with?A . Keylogger B. Rootkit...
Which of the following must be completed before the change can be approved?
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?A . Risk analysis B. Sandbox testing C. End user acceptance D. Lessons learnedView AnswerAnswer: A Explanation: A risk analysis must be completed before a change...
A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?
A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?A . Recalibrating the magnetometer B. Recalibrating the compass C. Recalibrating the digitizer D. Recalibrating the accelerometerView AnswerAnswer:...
Which of the following is the proper way for a technician to dispose of used printer consumables?
Which of the following is the proper way for a technician to dispose of used printer consumables?A . Proceed with the custom manufacturer's procedure. B. Proceed with the disposal of consumables in standard trash receptacles. C. Empty any residual ink or toner from consumables before disposing of them in a...
Which of the following describes what the technician should do?
A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?A . Have the user consider using an iPad if the user is unable to complete updates B. Have the user text the user's password to...
Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?
A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?A . UEFI password B. Secure boot C. Account lockout D. Restricted user permissionsView...