Which of the following Linux commands would be used to install an application?
Which of the following Linux commands would be used to install an application? A. yum B. grep C. Is D. sudoView AnswerAnswer: A Explanation: A. yum - "yum" stands for "Yellowdog Updater, Modified." It's a command-line package management utility for computers running the Linux operating system using the RPM Package...
Which of the following methods should the technician use to refresh the laptop?
A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?A . Internet-based upgrade B. Repair installation C. Clean install D. USB repair E. In place upgradeView AnswerAnswer: C Explanation: The desktop...
Which of the following is the MOST effective way to check other machines on the network for this unknown threat?
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the...
Which of the following BEST describes what the systems administrator should tell the user?
A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?A ....
Which of the following is the MOST likely reason the user is having this issue?
A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?A . The user is not connected to the VPN. B. The file server...
Which of the following configurations should the technician employ to achieve this goal?
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?A . Configure the network as private B. Enable...
Which of the following should the technician check FIRST?
Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?A . System time B. IP address C. DNS servers D. Windows updatesView AnswerAnswer: C Explanation: When a user experiences unexpected or erratic behavior while...
Which of the following should the technician do NEXT?
A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser...
In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).
In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO). A. A new IT policy requires users to set up a lock screen PIN. B. A user is overseas and wants to use a compatible international SIM Card. C. A user left the phone...
Which of the following is used as a password manager in the macOS?
Which of the following is used as a password manager in the macOS?A . Terminal B. FileVault C. Privacy D. KeychainView AnswerAnswer: D Explanation: Keychain is a feature of macOS that securely stores passwords, account numbers, and other confidential information for your Mac, apps, servers, and websites1. You can use...