Which of the following should the technician perform FIRST?

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?A . Escalate the ticket to Tier 2. B. Run a virus scan. C. Utilize a Windows restore point. D. Reimage...

July 28, 2023 No Comments READ MORE +

Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...

July 28, 2023 No Comments READ MORE +

Which of the following BEST describes what the systems administrator should tell the user?

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?A ....

July 28, 2023 No Comments READ MORE +

Which of the following should a support technician check FIRST?

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?A . User account status B. Mobile OS version C. Data plan coverage D....

July 28, 2023 No Comments READ MORE +

Which of the following attacks MOST likely occurred?

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute force B. Zero day C. Denial of service D. On-pathView AnswerAnswer: B Explanation: A zero-day attack...

July 28, 2023 No Comments READ MORE +

Which of the following is MOST likely the cause of this issue?

While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST...

July 27, 2023 No Comments READ MORE +

Which of the following should the technician MOST likely have done to prevent damage?

A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?A . Removed all jewelry B. Completed an inventory of tools before use C. Practiced electrical fire...

July 27, 2023 No Comments READ MORE +

Which of the following could be used to implement secure physical access to a data center?

Which of the following could be used to implement secure physical access to a data center?A . Geofence B. Alarm system C. Badge reader D. Motion sensorView AnswerAnswer: C Explanation: Badge readers are used to implement secure physical access to a data center. They are used to read the identification...

July 27, 2023 No Comments READ MORE +

Which of the following backup methods would BEST meet the requirements?

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?A ....

July 27, 2023 No Comments READ MORE +