Which of the following BEST describes the technician's actions?
A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?A . Avoid distractions B. Deal appropriately with customer's confidential material . C. Adhere to user privacy...
Which of the following backup methods would BEST meet the requirements?
An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?A ....
Which of the following sign-on options would allow any employee the ability to unlock the kiosk?
A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability...
A user reports a computer is running slow.
A user reports a computer is running slow. Which of the following tools will help a technician identity the issuedA . Disk Cleanup B. Group Policy Editor C. Disk Management D. Resource MonitorView AnswerAnswer: D Explanation: Resource Monitor will help a technician identify the issue when a user reports a...
Which of the following practices should the technician use to make sure the ticket is associated with the correct user?
When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?A . Have the user provide a callback phone number to be added...
Which of the following should the technician confirm NEXT as part of the troubleshooting process?
A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which...
Which of the following is causing the login issue?
A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?A...
Which of the following is MOST likely the cause of this issue?
While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST...
Which of the following explains why the technician unable to find this menu item?
A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician unable to find this menu item?A . The hardware does not meet BitLocker's minimum system requirements. B....
Which of the following is the MOST effective way to check other machines on the network for this unknown threat?
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the...