Which of the following should the network administrator do NEXT?
A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access. Which of the following should the network...
Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?A . sudoB . chmodC . grepD . pwdView AnswerAnswer: A
Which of the following configurations MOST likely allowed the attack to take place?
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select...
Which of the following tasks should be done FIRST?
A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low. Which of the following...
Which of the following steps should the technician take NEXT to resolve the problem?
A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the...
Which of the following commands should the technician use to correct this issue?
A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)A . dirB . chdskC . dismD . ipconfigE . formatF . diskpartView AnswerAnswer: B,C
Which of the following methods should be used?
A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?A . DegaussB . Drive wipeC . Standard formatD . Low-level formatView AnswerAnswer: B
Which of the following plans must be implemented to revert back to the most recent version of the firmware?
During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware?A . Backout planB . Contingency planC . Alternative planD . Backup...
With which of the following types is a man-in-the-middle attack associated?
With which of the following types is a man-in-the-middle attack associated?A . Brute forceB . SpoofingC . DDoSD . Zero-dayView AnswerAnswer: B
Which of the following should they use at this site while setting up the server room?
A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?A . Air filtersB . Privacy screensC . VacuumsD . ESD matsView AnswerAnswer: A