How can they restore these files using OneDrive?

A user has accidentally deleted a folder containing critical business presentations from their computer. How can they restore these files using OneDrive?A . Retrieve the files from the Windows Recycle BinB . Restore the files from the OneDrive Recycle BinC . Perform a system restore on their computerD . Reinstall...

February 11, 2025 No Comments READ MORE +

When configuring a new employee’s access in AWS IAM, what is a best practice for ensuring they only have the necessary permissions to fulfill their job responsibilities?

When configuring a new employee’s access in AWS IAM, what is a best practice for ensuring they only have the necessary permissions to fulfill their job responsibilities?A . Grant full administrative privileges to ensure no access barriersB . Use managed policies to assign permissionsC . Assign permissions directly to individual...

February 9, 2025 No Comments READ MORE +

What should the IT support technician advise the user to do on their Windows 10 device?

A user in a corporate environment is required to confirm their device’s IPv6 address for network configuration purposes. What should the IT support technician advise the user to do on their Windows 10 device?A . Navigate to Settings > Network & Internet > Status > PropertiesB . Open Command Prompt...

February 8, 2025 No Comments READ MORE +

What should a technician suggest first to troubleshoot the issue?

A user reports that their computer is running slowly following a recent Windows update. What should a technician suggest first to troubleshoot the issue?A . Roll back the latest Windows updateB . Check for and install any pending updatesC . Perform a full system formatD . Replace the user's computer...

February 8, 2025 No Comments READ MORE +

Which protocol is primarily used when a user attempts to map a drive to access files stored on a cloud service like Box?

Which protocol is primarily used when a user attempts to map a drive to access files stored on a cloud service like Box?A . SMBB . FTPC . WebDAVD . SNMPView AnswerAnswer: C Explanation: WebDAV WebDAV (Web Distributed Authoring and Versioning) is the protocol commonly used to map network drives...

February 7, 2025 No Comments READ MORE +

What is the most important safety procedure to follow before starting the repair?

A technician is scheduled to replace a broken LCD screen on a laptop. What is the most important safety procedure to follow before starting the repair?A . Work on a metal surface to keep the tools organizedB . Disconnect the laptop from any power source and remove the batteryC ....

February 6, 2025 No Comments READ MORE +

What should the user do first to identify and stop the problematic process?

A user’s PC is running slowly and they suspect a background process is consuming too many resources. What should the user do first to identify and stop the problematic process?A . Disable all startup applicationsB . Open Task Manager and sort processes by memory usage to identify and end the...

February 5, 2025 No Comments READ MORE +

What should be the technician’s first course of action?

A technician finds a small fire has started in a trash bin near workstations while performing end-of-day duties. What should be the technician’s first course of action?A . Attempt to extinguish the fire using a water-based extinguisherB . Evacuate the area and immediately alert the fire departmentC . Remove flammable...

February 5, 2025 No Comments READ MORE +

What safety precaution is most important to prevent accidents?

A technician needs to check network cables in a tight and cluttered server room. What safety precaution is most important to prevent accidents?A . Move quickly through the server room to minimize time spent in a confined spaceB . Use appropriate signage to indicate maintenance is in progress and secure...

February 4, 2025 No Comments READ MORE +

What is the most important step to ensure all users have continuous access?

An IT support technician needs to map a shared drive using SMB protocol for users in a Windows environment so they can access departmental documents. What is the most important step to ensure all users have continuous access? A. Assign a static IP address to the server hosting the shared...

February 4, 2025 No Comments READ MORE +