Which of the following Linux commands would be used to install an application?
Which of the following Linux commands would be used to install an application? A. yum B. grep C. Is D. sudoView AnswerAnswer: A Explanation: A. yum - "yum" stands for "Yellowdog Updater, Modified." It's a command-line package management utility for computers running the Linux operating system using the RPM Package...
Which of the following should the technician attempt FIRST?
A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed: crypt32.d11 is missing not found Which of the following should the technician attempt FIRST?A . Rebuild Windows profiles. B. Reimage the workstation...
Which of the following is the MOST deficient way lor the owner to install the application?
A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application? A. Use...
Which of the following documents will the new employee need to sign before being granted login access to the network?
A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network?A . MSDS B. EULA C. UAC D. AUPView AnswerAnswer: D Explanation: A new employee will need to sign an AUP before being granted login...
Which of the following change management documents includes how to uninstall a patch?
Which of the following change management documents includes how to uninstall a patch?A . Purpose of change B. Rollback plan C. Scope of change D. Risk analysisView AnswerAnswer: B Explanation: The change management document that includes how to uninstall a patch is called the “rollback plan”. The rollback plan is...
Which of the following should the administrator do to help secure the device against this threat in the future?
A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO). A. Prevent a...
Which of the following filesystems is supported by both OS types?
A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?A . NTFS B. APFS C. ext4 D. exFATView AnswerAnswer: D Explanation: The filesystem that is supported...
Which of the following must be completed before the change can be approved?
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?A . Risk analysis B. Sandbox testing C. End user acceptance D. Lessons learnedView AnswerAnswer: A Explanation: A risk analysis must be completed before a change...
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:A...
Which of the following features BEST addresses the user's concern?
A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern? A. Remote wipe B. Anti-maIware C. Device encryption D....