Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?
A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?A . Standard formattingB . HD drillingC . Low-level formattingD . HD partitioningView AnswerAnswer: C
Which of the following terminal commands should the technician use?
A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use?A . apt-getB . iwconfigC . sudoD . ifconfigView...
Which of the following physical security measures should be used?
Company policy states that users must secure their laptops before leaving the office for the evening. Which of the following physical security measures should be used?A . Cable lockB . Windows key + LC . Smart card removalD . Key fobE . BIOS passwordView AnswerAnswer: A
Which of the following should the technician complete NEXT?
A technician Is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process. Which of the following should the technician complete NEXT?A . Scope of the changeB . Back-out planC...
Which of the following is a community supported, open source OS used for both services and workstations?
Which of the following is a community supported, open source OS used for both services and workstations?A . IOSB . Windows 10C . LinuxD . OS XView AnswerAnswer: C
Which of the following naming convention formats should the technician follow?
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?A . Domain name, location, IP addressB . Domain name, location, asset IDC . Asset...
Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?
Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?A . Folder RedirectionB . Group PolicyC . Security GroupsD . Home FolderView AnswerAnswer: B
What a user is allowed to do on a computer network would be addressed in:
What a user is allowed to do on a computer network would be addressed in:A . a user acceptance policyB . regulatory and compliance policyC . a password policyD . an acceptable use policyView AnswerAnswer: D
Which of the following Windows versions introduced using applications in the Metro interface?
Which of the following Windows versions introduced using applications in the Metro interface?A . Windows 7B . Windows 8C . Windows 8.1D . Windows 10View AnswerAnswer: B
Which of the following methods should be used?
A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?A . DegaussB . Drive wipeC . Standard formatD . Low-level formatView AnswerAnswer: B