Which of the following describes this incident?

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . PretextingB . SpoofingC . VishingD . ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...

August 1, 2024 No Comments READ MORE +

Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability...

August 1, 2024 No Comments READ MORE +

Which of the following change management documents includes how to uninstall a patch?

Which of the following change management documents includes how to uninstall a patch?A . Purpose of changeB . Rollback planC . Scope of changeD . Risk analysisView AnswerAnswer: B Explanation: The change management document that includes how to uninstall a patch is called the “rollback plan”. The rollback plan is...

August 1, 2024 No Comments READ MORE +

Which of the following should the technician use to mitigate this issue?

A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?A . Surge suppressorB . Battery backupC . CMOS batteryD...

July 31, 2024 No Comments READ MORE +

Which of the following should the technician MOST likely have done to prevent damage?

A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?A . Removed all jewelryB . Completed an inventory of tools before useC . Practiced electrical fire...

July 31, 2024 No Comments READ MORE +

Which of the following BEST describes the technician's actions?

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?A . Avoid distractionsB . Deal appropriately with customer's confidential material.C . Adhere to user privacy policyD...

July 31, 2024 No Comments READ MORE +

Which of the following should the technician do NEXT?

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser...

July 31, 2024 No Comments READ MORE +

Which of the following tools can be used?

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used? A. afc B. ehkdsk C. git clone D. zobocopyView AnswerAnswer: D Explanation: A. scp...

July 31, 2024 No Comments READ MORE +

Which of the following should the technician do FIRST?

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should...

July 31, 2024 No Comments READ MORE +

Which of the following is MOST likely contained in an EULA?

Which of the following is MOST likely contained in an EULA?A . Chain of custodyB . Backup of software codeC . Personally identifiable informationD . Restrictions of useView AnswerAnswer: D Explanation: An EULA (End-User License Agreement) is a legally binding contract between a software supplier and a customer or end-user,...

July 30, 2024 No Comments READ MORE +