Which of the followings tools should the technician use to accomplish this task?
A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?A . Consoltf B. Disk Utility C. Time Machine D. FileVaultView AnswerAnswer: B Explanation: The technician should use Disk Utility...
Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?
Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?A . gpedit B. gpmc C. gpresult D. gpupdateView AnswerAnswer: A Explanation: The feature that allows a technician to configure policies in a Windows 10 Professional desktop is gpedit. Gpedit is a command that...
Which of the following would be the BEST method to protect against unauthorized use?
A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?A . Implementing password expiration B. Restricting user permissions C. Using...
Which of the following is the MOST effective method to accomplish this task?
A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?A . Degaussing B. Low-level formatting C. Recycling D. ShreddingView AnswerAnswer: D Explanation: Shredding is the most effective method to securely dispose of data stored on...
Which of the following change management documents includes how to uninstall a patch?
Which of the following change management documents includes how to uninstall a patch?A . Purpose of change B. Rollback plan C. Scope of change D. Risk analysisView AnswerAnswer: B Explanation: The change management document that includes how to uninstall a patch is called the “rollback plan”. The rollback plan is...
Which of the following steps would MOST likely resolve the issue?
A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives...
Which of the following describes this incident?
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . Pretexting B. Spoofing C. Vishing D. ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...
Which of the following is the BEST method to use for the physical destruction of SSDs?
A data center is required to destroy SSDs that contain sensitive information. Which of the following is the BEST method to use for the physical destruction of SSDs?A . Wiping B. Low-level formatting C. Shredding D. ErasingView AnswerAnswer: C Explanation: Shredding is the best method to use for the physical...
Which of the following is an example of MFA?
Which of the following is an example of MFA?A . Fingerprint scan and retina scan B. Password and PIN C. Username and password D. Smart card and passwordView AnswerAnswer: D Explanation: Smart card and password is an example of two-factor authentication (2FA), not multi-factor authentication (MFA). MFA requires two or...
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?A . Home B. Pro for Workstations C. Enterprise D. ProView AnswerAnswer: D Explanation: The most cost-effective version of Windows 10 that allows remote access through Remote Desktop is Windows 10 Pro....