Which of the following is considered government-regulated data?

Which of the following is considered government-regulated data?A . PIIB . End-user license agreementC . Digital Millennium Copyright ActD . DRMView AnswerAnswer: A

November 19, 2020 No Comments READ MORE +

Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?A . Create a policy to...

November 18, 2020 No Comments READ MORE +

Which of the following should the technician do FIRST?

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?A...

November 18, 2020 No Comments READ MORE +

Which of the following documents did the network administrator MOST likely give to the technician?

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?A . Process diagramB . Physical network diagramC . Fiber backbone diagramD . Logical...

November 18, 2020 No Comments READ MORE +

Which of the following provide the BEST security for a server room? (Select two.)

Which of the following provide the BEST security for a server room? (Select two.)A . Badge readerB . BollardC . Biometric lockD . Cable lockE . USB tokenF . Privacy window shadesView AnswerAnswer: A, C

November 18, 2020 No Comments READ MORE +

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?A . SSOB . Permission propagationC . InheritanceD . MFAView AnswerAnswer: A

November 18, 2020 No Comments READ MORE +

Which of the following should the technician do NEXT?

A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem. Which of the...

November 18, 2020 No Comments READ MORE +

Which of the following settings or features is responsible for the problems Ann is experiencing?

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset,...

November 18, 2020 No Comments READ MORE +

Which of the following would explain why Joe cannot access his personal shares?

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?A . An IP...

November 18, 2020 No Comments READ MORE +

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?A . Put on an ESD strap.B . Place components on an ESD matC . Disconnect the power before servicing the PCD . Place the PC on a grounded work benchView AnswerAnswer:...

November 18, 2020 No Comments READ MORE +