Which of the following should the technician perform FIRST?
A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?A . Escalate the ticket to Tier 2. B. Run a virus scan. C. Utilize a Windows restore point. D. Reimage...
A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning devices also turned off. In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer without losing any data
DRAG DROP A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping,...
Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...
Which of the following BEST describes what the systems administrator should tell the user?
A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?A ....
Which of the following should a support technician check FIRST?
A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?A . User account status B. Mobile OS version C. Data plan coverage D....
Which of the following attacks MOST likely occurred?
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute force B. Zero day C. Denial of service D. On-pathView AnswerAnswer: B Explanation: A zero-day attack...
Which of the following is MOST likely the cause of this issue?
While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST...
Which of the following should the technician MOST likely have done to prevent damage?
A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?A . Removed all jewelry B. Completed an inventory of tools before use C. Practiced electrical fire...
Which of the following could be used to implement secure physical access to a data center?
Which of the following could be used to implement secure physical access to a data center?A . Geofence B. Alarm system C. Badge reader D. Motion sensorView AnswerAnswer: C Explanation: Badge readers are used to implement secure physical access to a data center. They are used to read the identification...
Which of the following backup methods would BEST meet the requirements?
An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?A ....