Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?
A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed . Which of the...
Which of the following is the MOST effective way to check other machines on the network for this unknown threat?
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the...
CORRECT TEXT
CORRECT TEXT Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online. INSTRUCTIONS Review the network diagrams...
Which of the following actions should the technician do FIRST?
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet . Which of the following actions should the technician do FIRST?A . Lock all devices in a closet. B. Ensure all devices are from the same...
Which of the following is the MOST effective method to accomplish this task?
A company needs to securely dispose of data stored on optical discs . Which of the following is the MOST effective method to accomplish this task?A . Degaussing B. Low-level formatting C. Recycling D. ShreddingView AnswerAnswer: D
Which of the following should the technician perform FIRST to mitigate the issue?
A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings . Which of the following should the technician perform FIRST to...
Which of the following BEST describes the purpose of this string?
Upon downloading a new ISO, an administrator is presented with the following string: 59d15a16ce90cBcc97fa7c211b767aB Which of the following BEST describes the purpose of this string?A . XSS verification B. AES-256 verification C. Hash verification D. Digital signature verificationView AnswerAnswer: C
Which of the following would BEST limit the bark's risk?
The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems . Which of the...
Which of the following practices should the technician use to make sure the ticket is associated with the correct user?
When a user calls in to report an issue, a technician submits a ticket on the user's behalf . Which of the following practices should the technician use to make sure the ticket is associated with the correct user?A . Have the user provide a callback phone number to be...
Which of the following practices should the technician use to make sure the ticket is associated with the correct user?
When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?A . Have the user provide a callback phone number to be added...