Which of the following has MOST likely occurred?
A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds...
Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:A...
During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before.
During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the...
Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue
HOTSPOT Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue. Click on individual tickers to see the ticket details. View attachments to determine the problem. Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST...
Which of the following agreements IS MOST likely in use?
A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a button labeled Accept. Which of the following agreements IS MOST likely in use?A . DRMB . NDAC . EULAD . MOUView AnswerAnswer: C...
Which of the following filesystems will the technician MOST likely use?
A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use? A. FAT32 B. ext4 C. NTFS D. exFATView AnswerAnswer: D Explanation: A. FAT32 - This is not a...
Which of the following must be completed before the change can be approved?
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?A . Risk analysisB . Sandbox testingC . End user acceptanceD . Lessons learnedView AnswerAnswer: A Explanation: A risk analysis must be completed before a change...
Which of the following configurations should the technician employ to achieve this goal?
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?A . Configure the network as privateB . Enable...
Which of the following BEST describes the change in policy?
An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?A . Login timesB . Screen lockC . User permissionD . Login lockout attemptsView AnswerAnswer: B Explanation: Screen lock is...