Which of the following should the technician perform FIRST to mitigate the issue?
A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate...
Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?
An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?A . RDP through RD Gateway B. Apple Remote Desktop C. SSH access with SSH keys D....
Which of the following is the BEST way the officer can secure the workstation quickly when walking away?
A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?A . Use a key combination to lock the computer when leaving. B. Ensure no unauthorized personnel are in the...
Which of the following programs can the technician use to view startup items?
A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view...
Which of the following tools should the help desk technician use to remove the malicious software?
A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO). A. File Explorer B. User Account Control C. Windows Backup and Restore D. Windows Firewall E. Windows...
Which of the following would BEST mitigate this threat?
The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?A . Encryption at rest B. Account lockout C. Automatic screen lock D. AntivirusView AnswerAnswer: B Explanation:...
How do you want to Open this file?
A help desk technician runs the following script: Inventory.py. The technician receives the following error message: How do you want to Open this file? Which of the following is the MOST likely reason this script is unable to run?A . Scripts are not permitted to run. B. The script was...
Which of the following types of malware is the system MOST likely infected with?
A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%. Which of the following types of malware is the system MOST likely infected with?A . Keylogger B. Rootkit...
Which of the following must be completed before the change can be approved?
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?A . Risk analysis B. Sandbox testing C. End user acceptance D. Lessons learnedView AnswerAnswer: A Explanation: A risk analysis must be completed before a change...
A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?
A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?A . Recalibrating the magnetometer B. Recalibrating the compass C. Recalibrating the digitizer D. Recalibrating the accelerometerView AnswerAnswer:...