A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:A...
Which of the following should the administrator do to help secure the device against this threat in the future?
A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).A . Prevent a...
Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls?
A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).A . Encryption B. Antivirus C. AutoRun D. Guest accounts E. Default passwords...
Which of the following applications should the technician use to assist the user with hiding the file?
A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?A . Device Manager B. Indexing Options C. File Explorer D. Administrative ToolsView...
Which of the following should the technician do to BEST minimize this issue?
A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?A...
Which of the following must be completed before the change can be approved?
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?A . Risk analysis B. Sandbox testing C. End user acceptance D. Lessons learnedView AnswerAnswer: A Explanation: A risk analysis must be completed before a change...
Which of the following settings should the user change FIRST?
A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?A . Encryption B. Wi-Fi channel C. Default passwords D. Service set identifierView AnswerAnswer: C Explanation: the user should change the default passwords first when configuring a new...
Which of the following is a consequence of end-of-lite operating systems?
Which of the following is a consequence of end-of-lite operating systems?A . Operating systems void the hardware warranty. B. Operating systems cease to function. C. Operating systems no longer receive updates. D. Operating systems are unable to migrate data to the new operating system.View AnswerAnswer: C Explanation: End-of-life operating systems...
Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal?
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal?A . Security and Maintenance B. Network and...
Which of the following Windows settings should the user utilize to create the secondary login?
A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings...