Which of the following steps should the technician take NEXT to resolve the problem?

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the...

December 7, 2021 No Comments READ MORE +

Which of the following is the memory limitation of a 32-bit OS?

Which of the following is the memory limitation of a 32-bit OS?A . 16MBB . 2048MBC . 4GBD . 1024GBE . 2TBF . 8TBView AnswerAnswer: C

December 7, 2021 No Comments READ MORE +

Which of the following should the technician check NEXT?

Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates...

December 7, 2021 No Comments READ MORE +

A CSP providing cloud services currently being used by the United States federal government should obtain which of the following to assure compliance to stringent government standards?

A CSP providing cloud services currently being used by the United States federal government should obtain which of the following to assure compliance to stringent government standards?A . Multi-Tier Cloud Security (MTCS) AttestationB . FedRAMP AuthorizationC . ISO/IEC 27001:2013 CertificationD . CSA STAR Level CertificateView AnswerAnswer: B Explanation: Reference: https://www.ftptoday.com/blog/benefits-using-fedramp-authorized-cloud-service-provider

December 7, 2021 No Comments READ MORE +

Which of the following types of scripts would be seen on the user end of a web page?

Which of the following types of scripts would be seen on the user end of a web page?A . .batB . .jsC . .shD . .vbsView AnswerAnswer: D

December 7, 2021 No Comments READ MORE +

Which of the following NTFS security settings overrides all other settings?

Which of the following NTFS security settings overrides all other settings?A . DenyB . ModifyC . ReadD . WriteView AnswerAnswer: D

December 7, 2021 No Comments READ MORE +

Which of the following configurations MOST likely allowed the attack to take place?

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select...

December 7, 2021 No Comments READ MORE +

Which of the following provide the BEST security for a server room? (Select two.)

Which of the following provide the BEST security for a server room? (Select two.)A . Badge readerB . BollardC . Biometric lockD . Cable lockE . USB tokenF . Privacy window shadesView AnswerAnswer: A,C

December 6, 2021 No Comments READ MORE +

Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?

A customer’s computer is having difficulty opening programs and regularly receives error messages regarding low system resources. Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?A . Data execution preventionB . Page-file sizeC . Visual effectsD . Processor schedulingView AnswerAnswer: B

December 6, 2021 No Comments READ MORE +

Which of the following tasks should be done FIRST?

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low. Which of the following...

December 6, 2021 No Comments READ MORE +