Which of the following operating systems will a technician MOST likely recommend?

A user wants a phone with an operating system that is highly customizable. Which of the following operating systems will a technician MOST likely recommend?A . Windows MobileB . AndroidC . Fire OSD . iOSView AnswerAnswer: B

March 12, 2021 No Comments READ MORE +

With which of the following types is a man-in-the-middle attack associated?

With which of the following types is a man-in-the-middle attack associated?A . Brute forceB . SpoofingC . DDoSD . Zero-dayView AnswerAnswer: B

December 2, 2020 No Comments READ MORE +

Which of the following should a technician recommend?

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?A . Uninterruptible power supplyB . Surge protectorC . Power stripD . Power...

December 2, 2020 No Comments READ MORE +

Which of the following steps should the technician take NEXT to resolve the problem?

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the...

December 2, 2020 No Comments READ MORE +

Which of the following should the technician do NEXT according to malware removal best practices?

A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?A . Enable System Restore and create a restore point so no data is lostB . Educate the user about how to avoid malware in the futureC...

December 2, 2020 No Comments READ MORE +

Which of the following configurations MOST likely allowed the attack to take place?

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select...

December 2, 2020 No Comments READ MORE +

Which of the following protocols and authentication methods should the technician implement?

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement?...

December 2, 2020 No Comments READ MORE +

Which of the following actions should be taken to close the vulnerability?

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)A . Disable...

December 1, 2020 No Comments READ MORE +

If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following...

December 1, 2020 No Comments READ MORE +

Which of the following license type should the technician recommend?

A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?A . Open licenseB . Personal licenseC . Corporate licenseD . Enterprise licenseView AnswerAnswer: A

December 1, 2020 No Comments READ MORE +