Which of the following boot methods initiates such an upgrade?
A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?A . SSDB . Optical driveC . Flash driveD . PXEView...
Which of the following is the technician MOST likely performing on the computer?
A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?A . Image deploymentB . Multiboot configurationC . In-place upgradeD . System repairView AnswerAnswer: A
Which of the following built-in utilities should be used?
A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?A . Time MachineB . SnapshotC . System RestoreD . Boot CampView AnswerAnswer:...
Which of the following commands should the technician use to correct this issue?
A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)A . dirB . chdskC . dismD . ipconfigE . formatF . diskpartView AnswerAnswer: B, C
Which of the following will provide the ability to access these devices?
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?A . TelnetB . SSHC ....
Which of the following should the technician do to resolve the problem?
A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are: - Two 1GHz CPUs - 2GB of memory - 15GB hard drive - 800 × 600 screen resolution Which of the following should the technician do to resolve the...
Which of the following should the help desk perform to fix the issue?
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure. Which of the following should the help desk...
Which of the following Control Panel utilities should the technician use?
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?A . SystemB . DisplayC . Folder OptionsD . Indexing OptionsView AnswerAnswer: C
Which of the following authentication methods is being requested?
Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?A . Single-factorB . MultifactorC . RADIUSD . TACACSView AnswerAnswer: A
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?A . 2GBB . 4GBC . 8GBD . 16GBView AnswerAnswer: B