Which of the following is causing the login issue?
A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?A...
Which of the following should a support technician check FIRST?
A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?A . User account statusB . Mobile OS versionC . Data plan coverageD ....
Which of the following technologies can be implemented to prevent this issue?
A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?A . Signed system imagesB . AntivirusC . SSOD . MDMView AnswerAnswer: D Explanation: MDM stands for...
Which of the following should the technician use to mitigate this issue?
A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?A . Surge suppressorB . Battery backupC . CMOS batteryD...
Which of the following would BEST mitigate this threat?
The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?A . Encryption at restB . Account lockoutC . Automatic screen lockD . AntivirusView AnswerAnswer: B Explanation:...
In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).
In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO). A. A new IT policy requires users to set up a lock screen PIN. B. A user is overseas and wants to use a compatible international SIM Card. C. A user left the phone...
Which of the following actions should the technician do FIRST?
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?A . Lock all devices in a closet.B . Ensure all devices are from the same manufacturer.C...
Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?
Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?A . Remote AssistanceB . Remote Desktop ProtocolC . Screen SharingD . Virtual Network ComputingView AnswerAnswer: C Explanation: Screen Sharing is the default system tool that can...
A user wants to set up speech recognition on a PC In which of the following Windows Settings tools can the user enable this option?
A user wants to set up speech recognition on a PC In which of the following Windows Settings tools can the user enable this option?A . LanguageB . SystemC . PersonalizationD . Ease of AccessView AnswerAnswer: D Explanation: The user can enable speech recognition on a PC in the Ease...
Which of the following is the MOST effective way to check other machines on the network for this unknown threat?
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the...