In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).A . A new IT policy requires users to set up a lock screen PIN. B. A user is overseas and wants to use a compatible international SIM Card. C. A user left the phone...

May 24, 2023 No Comments READ MORE +

Which pf the following actions is the FIRST step the technician should take?

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file extension Which pf the following actions is the FIRST step the technician should take?A . Runa live disk clone. B. Run a...

May 24, 2023 No Comments READ MORE +

Which of the following tools should the help desk technician use to remove the malicious software?

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO). A. File Explorer B. User Account Control C. Windows Backup and Restore D. Windows Firewall E. Windows...

May 23, 2023 No Comments READ MORE +

Which of the following would BEST mitigate this threat?

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?A . Encryption at rest B. Account lockout C. Automatic screen lock D. AntivirusView AnswerAnswer: B Explanation:...

May 23, 2023 No Comments READ MORE +

Which of the following types of malware is the system MOST likely infected with?

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%. Which of the following types of malware is the system MOST likely infected with?A . Keylogger B. Rootkit...

May 23, 2023 No Comments READ MORE +

Which of the following must be completed before the change can be approved?

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?A . Risk analysis B. Sandbox testing C. End user acceptance D. Lessons learnedView AnswerAnswer: A Explanation: A risk analysis must be completed before a change...

May 23, 2023 No Comments READ MORE +

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?A . Recalibrating the magnetometer B. Recalibrating the compass C. Recalibrating the digitizer D. Recalibrating the accelerometerView AnswerAnswer:...

May 23, 2023 No Comments READ MORE +

Which of the following is the proper way for a technician to dispose of used printer consumables?

Which of the following is the proper way for a technician to dispose of used printer consumables?A . Proceed with the custom manufacturer's procedure. B. Proceed with the disposal of consumables in standard trash receptacles. C. Empty any residual ink or toner from consumables before disposing of them in a...

May 23, 2023 No Comments READ MORE +

Which of the following describes what the technician should do?

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?A . Have the user consider using an iPad if the user is unable to complete updates B. Have the user text the user's password to...

May 22, 2023 No Comments READ MORE +

Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?A . UEFI password B. Secure boot C. Account lockout D. Restricted user permissionsView...

May 22, 2023 No Comments READ MORE +