Which of the following installation types would require the use of an answer file to install the OS?

Which of the following installation types would require the use of an answer file to install the OS?A . UnattendedB . CleanC . RepairD . UpgradeView AnswerAnswer: A

November 20, 2019No CommentsREAD MORE +

Which of the following will provide the ability to access these devices?

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?A . TelnetB . SSHC ....

November 20, 2019No CommentsREAD MORE +

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?A . 2GBB . 4GBC . 8GBD . 16GBView AnswerAnswer: B

November 20, 2019No CommentsREAD MORE +

Which of the following is the maximum RAM limit of a Windows 32-bit version?

Which of the following is the maximum RAM limit of a Windows 32-bit version?A . no limitB . 4GBC . 8GBD . 32GBView AnswerAnswer: B

November 19, 2019No CommentsREAD MORE +

Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?A . Create a policy to...

November 19, 2019No CommentsREAD MORE +

Which of the following built-in utilities should be used?

A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?A . Time MachineB . SnapshotC . System RestoreD . Boot CampView AnswerAnswer:...

November 19, 2019No CommentsREAD MORE +

Which of the following command-line tools should the technician use to apply the new policy?

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard...

November 18, 2019No CommentsREAD MORE +

Which of the following types of social engineering threats is this?

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?A . PhishingB . Spear phishingC . Dumpster divingD . ImpersonationView AnswerAnswer: C

November 18, 2019No CommentsREAD MORE +

Which of the following should the help desk perform to fix the issue?

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure. Which of the following should the help desk...

November 18, 2019No CommentsREAD MORE +

Which of the following configurations MOST likely allowed the attack to take place?

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select...

November 17, 2019No CommentsREAD MORE +