Which of the following programs can the technician use to view startup items?
A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view...
Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).
Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).A . .mac B. .Pkg C. .deb D. .dmg E. .msi F. .appx G. .app H. .apkView AnswerAnswer: B,D,G Explanation: https://support.microsoft.com/en-us/windows/common-file-name-extensions-in-windows-da4a4430-8e76-89c5-59f7-1cdbbc75cb01.pkg and .dmg are files used to distribute and install applications on macOS....
Which of the following social-engineering attacks is being attempted?
While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?A . Evil twin B. Impersonation C. Insider threat D. WhalingView AnswerAnswer: A Explanation: An evil twin is a...
Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?
An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?A . RDP through RD Gateway B. Apple Remote Desktop C. SSH access with SSH keys D....
Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...
Which of the following should be updated to reflect this new requirement?
A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?A . MDM B. EULA C. IRP D. AUPView AnswerAnswer: D Explanation: AUP (Acceptable Use Policy)...
Which of the following would BEST accomplish this task?
A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?A . Differential backup B. Off-site backup C. Incremental backup D. Full backupView AnswerAnswer: D Explanation: To accomplish this task, the technician...
Which of the following is the MOST likely cause of the issue?
A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?A . Private-browsing mode B. Invalid certificate C....
During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before.
During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the...
Which of the following should the technician configure?
A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?A . WPA2 with TKIP B. WPA2 with AES C. WPA3withAES-256 D. WPA3 with AES-128View AnswerAnswer: B...