Which of the following should the technician verify in the command prompt to address the issue without making any changes?

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?A . Run sfc / scannow on the drive as the administrator. B. Run clearnmgr on the drive...

July 29, 2023 No Comments READ MORE +

Which of the following backup methods would BEST address these concerns?

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?A . Full B. Differential C. Off-site D. Grandfather-father-sonView AnswerAnswer: B Explanation: The...

July 29, 2023 No Comments READ MORE +

Which of the following steps should the technician take?

A technician is installing a program from an ISO file. Which of the following steps should the technician take?A . Mount the ISO and run the installation file. B. Copy the ISO and execute on the server. C. Copy the ISO file to a backup location and run the ISO...

July 28, 2023 No Comments READ MORE +

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?A . Remote Assistance B. Remote Desktop Protocol C. Screen Sharing D. Virtual Network ComputingView AnswerAnswer: C Explanation: Screen Sharing is the default system tool that can...

July 28, 2023 No Comments READ MORE +

Which of the following should the technician perform FIRST?

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?A . Escalate the ticket to Tier 2. B. Run a virus scan. C. Utilize a Windows restore point. D. Reimage...

July 28, 2023 No Comments READ MORE +

Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...

July 28, 2023 No Comments READ MORE +

Which of the following BEST describes what the systems administrator should tell the user?

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?A ....

July 28, 2023 No Comments READ MORE +

Which of the following should a support technician check FIRST?

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?A . User account status B. Mobile OS version C. Data plan coverage D....

July 28, 2023 No Comments READ MORE +

Which of the following attacks MOST likely occurred?

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute force B. Zero day C. Denial of service D. On-pathView AnswerAnswer: B Explanation: A zero-day attack...

July 28, 2023 No Comments READ MORE +