Which of the following actions should be taken to close the vulnerability?
A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Choose two.)A . Disable...
Which of the following naming convention formats should the technician follow?
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?A . Domain name, location, IP addressB . Domain name, location, asset IDC . Asset...
Which of the following will provide the ability to access these devices?
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?A . TelnetB . SSHC ....
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?A . Put on an ESD strap.B . Place components on an ESD matC . Disconnect the power before servicing the PCD . Place the PC on a grounded work benchView AnswerAnswer:...
Which of the following should the technician do?
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the...
Which of the following can Joe do to ensure the backups will work if needed?
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if...
Which of the following boot methods initiates such an upgrade?
A desktop technician is attempting to upgrade several machines to Windows 10. After realizing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?A . SSDB . Optical driveC . Flash driveD . PXEView...
Which of the following is the BEST method of securing the phone?
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?A . Fingerprint lockB . Passcode lockC . Swipe lockD . PIN lockView AnswerAnswer: A
Which of the following is the MOST likely issue Ann is experiencing?
Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she opens a browser, she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar. She has verified Bluetooth is...
Which of the following should be changed to resolve this issue?
A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and sees the following: Which of the following...