Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?
Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?A . Folder RedirectionB . Group PolicyC . Security GroupsD . Home FolderView AnswerAnswer: C
Which of the following actions should the IT department perform NEXT?
A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT?A . Preserve data integrityB . Identify...
Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?
A customer’s computer is having difficulty opening programs and regularly receives error messages regarding low system resources. Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?A . Data execution preventionB . Page-file sizeC . Visual effectsD . Processor schedulingView AnswerAnswer: B
Which of the following should the technician attempt NEXT?
A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?A . Reboot into safe mode and roll back the updatesB ....
If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following...
Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?
A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray: There are 1033 infected files on this computer. Click here to disinfect. The link is blocked by the corporate content filter and...
Which of the following should the technician check NEXT?
Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates...
Which of the following actions should be taken to close the vulnerability?
A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)A . Disable...
Which of the following would be BEST suited for this task?
A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard. Which of the following would be...
Which of the following should the technician do NEXT according to malware removal best practices?
A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?A . Enable System Restore and create a restore point so no data is lostB . Educate the user about how to avoid malware in the futureC...