Which of the following would provide the BEST security for the room?

A systems administrator needs to add security to the server room. Which of the following would provide the BEST security for the room? (Choose two.)A . Universal serial bus locksB . Personal identity verification cardsC . Privacy screenD . Entry control rosterE . Door locksF . Privacy windowView AnswerAnswer: E,F

December 4, 2021 No Comments READ MORE +

Which of the following documents did the network administrator MOST likely give to the technician?

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?A . Process diagramB . Physical network diagramC . Fiber backbone diagramD . Logical...

December 4, 2021 No Comments READ MORE +

Which of the following should the technician do NEXT?

Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click here" button to resolve it. There is a timer...

December 4, 2021 No Comments READ MORE +

Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?

Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?A . Folder RedirectionB . Group PolicyC . Security GroupsD . Home FolderView AnswerAnswer: C

December 4, 2021 No Comments READ MORE +

Which of the following would the technician MOST likely configure on the network device to accommodate the SOHO user’s request?

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connection and ensure that employees cannot applications or personal emails. Which of the following would the technician MOST likely configure on the network device to accommodate the SOHO...

December 4, 2021 No Comments READ MORE +

Which of the following technologies is used by malicious employees to obtain user passwords?

Which of the following technologies is used by malicious employees to obtain user passwords?A . Main-in-the-middleB . PhishingC . TailgatingD . Shoulder surfingView AnswerAnswer: D

December 4, 2021 No Comments READ MORE +

Which of the following Control Panel utilities can Joe use to help with this situation?

Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his...

December 4, 2021 No Comments READ MORE +

Which of the following should be changed to resolve this issue?

A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following: Which of the following...

December 3, 2021 No Comments READ MORE +

Which of the following user types BEST describes this user?

A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user?A . GuestB . Power UserC . AdministratorD . Standard UserView AnswerAnswer: A

December 3, 2021 No Comments READ MORE +

Which of the following would be the BEST resolution to issue?

Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue?A . Restart the tableB . Disable and...

December 3, 2021 No Comments READ MORE +