Which of the following tools should the technician use?
A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?A . Component ServicesB . System ConfigurationC . Security PolicyD . Local Users and GroupsView AnswerAnswer: D
Which of the following troubleshooting steps should the technician take NEXT?
A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?A . Reset the device’s network settingsB . Check the data usage...
Which of the following protocols and authentication methods should the technician implement?
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement?...
Which of the following Control Panel utilities should the technician use?
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?A . SystemB . DisplayC . Folder OptionsD . Indexing OptionsView AnswerAnswer: C
Which of the following types of social engineering threats is this?
An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?A . PhishingB . Spear phishingC . Dumpster divingD . ImpersonationView AnswerAnswer: C
Which of the following is a reason to use WEP over WPA?
Which of the following is a reason to use WEP over WPA?A . Device compatibilityB . Increased securityC . TACACSD . Multifactor authenticationView AnswerAnswer: A Explanation: WEP (Wired Equivalent Privacy) was introduced when the 802.11 standard for Wi-Fi networks was launched. It allows the use of a 64-bit or 128-bit...
Which of the following should the technician attempt NEXT?
A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?A . Reboot into safe mode and roll back the updatesB ....
Which of the following is the MOST secure wireless security protocol?
Which of the following is the MOST secure wireless security protocol?A . AESB . WPAC . WPA2D . WEPView AnswerAnswer: A
Which of the following configuration settings should the technician change to satisfy the requirements of the business?
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)A...
Which of the following MOST accurately describes the effect of the command?
A technician logs on to a Linux computer and runs the following command: ps -aux | grep vi Which of the following MOST accurately describes the effect of the command?A . It kills any running programs starting with the letters vi.B . It opens a list of directories that start...