Which of the following should the technician do NEXT?

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?A . Provide documentation of the repair to the customerB . Allow the customer...

December 8, 2021 No Comments READ MORE +

Which of the following devices provides protection against brownouts?

Which of the following devices provides protection against brownouts?A . battery backupB . surge suppressorC . rack groundingD . line conditionerView AnswerAnswer: A

December 8, 2021 No Comments READ MORE +

Which of the following recommendations should the contractor give to the customer?

A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which...

December 8, 2021 No Comments READ MORE +

Which of the following threats uses personalized information in an attempt at obtaining information?

Which of the following threats uses personalized information in an attempt at obtaining information?A . WhalingB . ImpersonationC . SpoofingD . Spear phishingView AnswerAnswer: D

December 8, 2021 No Comments READ MORE +

Which of the following Is MOST likely the Issue?

A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors. Which of the following Is...

December 8, 2021 No Comments READ MORE +

Which of the following will provide the ability to access these devices?

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?A . TelnetB . SSHC ....

December 7, 2021 No Comments READ MORE +

Which of the following best practices could have prevented the attack?

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack?A . Implementing strong passwordsB . Changing default credentialsC . Disabling AutoRunD...

December 7, 2021 No Comments READ MORE +

Which of the following security concepts has the company just enabled?

A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?A . CertificatesB . Least privilegeC . Directory permissionsD . BlacklistsView AnswerAnswer: B

December 7, 2021 No Comments READ MORE +

Which of the following built-in utilities should be used?

A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?A . Time MachineB . SnapshotC . System RestoreD . Boot CampView AnswerAnswer:...

December 7, 2021 No Comments READ MORE +

Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray: There are 1033 infected files on this computer. Click here to disinfect. The link is blocked by the corporate content filter and...

December 7, 2021 No Comments READ MORE +