Which of the following filesystems is supported by both OS types?

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?A . NTFS B. APFS C. ext4 D. exFATView AnswerAnswer: D Explanation: The filesystem that is supported...

June 29, 2023 No Comments READ MORE +

Which of the following backup methods would BEST address these concerns?

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?A . Full B. Differential C. Off-site D. Grandfather-father-sonView AnswerAnswer: B Explanation: The...

June 29, 2023 No Comments READ MORE +

Which of the following actions should the technician do FIRST?

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?A . Lock all devices in a closet. B. Ensure all devices are from the same manufacturer....

June 29, 2023 No Comments READ MORE +

Which of the following should the technician attempt FIRST?

A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed: crypt32.d11 is missing not found Which of the following should the technician attempt FIRST?A . Rebuild Windows profiles. B. Reimage the workstation...

June 29, 2023 No Comments READ MORE +

Which of the following is the STRONGEST wireless configuration?

Which of the following is the STRONGEST wireless configuration?A . WPS B. WPA3 C. WEP D. WMNView AnswerAnswer: B Explanation: The strongest wireless configuration is B. WPA3. WPA3 is the most up-to-date wireless encryption protocol and is the most secure choice. It replaces PSK with SAE, a more secure way...

June 29, 2023 No Comments READ MORE +

Which of the following attacks MOST likely occurred?

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute force B. Zero day C. Denial of service D. On-pathView AnswerAnswer: B Explanation: A zero-day attack...

June 29, 2023 No Comments READ MORE +

Which of the following types of documents is the administrator MOST likely creating?

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?A . Access control list B. Acceptable use policy C. Incident report D. Standard operating procedureView AnswerAnswer: A...

June 29, 2023 No Comments READ MORE +

Which of the following is the MOST likely next step in the change process?

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?A . End user acceptance B. Perform risk analysis C. Communicate to stakeholders D. Sandbox testingView AnswerAnswer: D Explanation: The risk analysis should be performed before it's taken...

June 29, 2023 No Comments READ MORE +

Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?

A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings...

June 28, 2023 No Comments READ MORE +

Which of the following BEST describes why the system still has malware?

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected....

June 28, 2023 No Comments READ MORE +