Which of the following should the technician verify in the command prompt to address the issue without making any changes?
A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?A . Run sfc / scannow on the drive as the administrator. B. Run clearnmgr on the drive...
Which of the following backup methods would BEST address these concerns?
A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?A . Full B. Differential C. Off-site D. Grandfather-father-sonView AnswerAnswer: B Explanation: The...
Which of the following steps should the technician take?
A technician is installing a program from an ISO file. Which of the following steps should the technician take?A . Mount the ISO and run the installation file. B. Copy the ISO and execute on the server. C. Copy the ISO file to a backup location and run the ISO...
Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?
Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?A . Remote Assistance B. Remote Desktop Protocol C. Screen Sharing D. Virtual Network ComputingView AnswerAnswer: C Explanation: Screen Sharing is the default system tool that can...
Which of the following should the technician perform FIRST?
A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?A . Escalate the ticket to Tier 2. B. Run a virus scan. C. Utilize a Windows restore point. D. Reimage...
A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning devices also turned off. In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer without losing any data
DRAG DROP A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping,...
Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...
Which of the following BEST describes what the systems administrator should tell the user?
A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?A ....
Which of the following should a support technician check FIRST?
A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?A . User account status B. Mobile OS version C. Data plan coverage D....
Which of the following attacks MOST likely occurred?
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute force B. Zero day C. Denial of service D. On-pathView AnswerAnswer: B Explanation: A zero-day attack...