Which of the following should the technician verify in the command prompt to address the issue without making any changes?

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?A . Run sfc / scannow on the drive as the administrator.B . Run clearnmgr on the drive...

March 5, 2024 No Comments READ MORE +

Which of the following could be used to implement secure physical access to a data center?

Which of the following could be used to implement secure physical access to a data center?A . GeofenceB . Alarm systemC . Badge readerD . Motion sensorView AnswerAnswer: C Explanation: Badge readers are used to implement secure physical access to a data center. They are used to read the identification...

March 5, 2024 No Comments READ MORE +

Which of the following is used as a password manager in the macOS?

Which of the following is used as a password manager in the macOS?A . TerminalB . FileVaultC . PrivacyD . KeychainView AnswerAnswer: D Explanation: Keychain is a feature of macOS that securely stores passwords, account numbers, and other confidential information for your Mac, apps, servers, and websites1. You can use...

March 4, 2024 No Comments READ MORE +

Which of the following types of malware is the system MOST likely infected with?

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%. Which of the following types of malware is the system MOST likely infected with?A . KeyloggerB . RootkitC...

March 4, 2024 No Comments READ MORE +

Which of the following backup methods would BEST address these concerns?

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?A . FullB . DifferentialC . Off-siteD . Grandfather-father-sonView AnswerAnswer: B Explanation: The...

March 4, 2024 No Comments READ MORE +

Which of the following should a technician do to allow access?

A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?A . Adjust the content filtering.B . Unmap port forwarding.C . Disable unused ports.D . Reduce the encryption strengthView AnswerAnswer: A Explanation: Content filtering is a process that manages...

March 4, 2024 No Comments READ MORE +

Which of the following is the MOST deficient way lor the owner to install the application?

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application? A. Use...

March 3, 2024 No Comments READ MORE +

Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?A . Use a key combination to lock the computer when leaving.B . Ensure no unauthorized personnel are in the...

March 3, 2024 No Comments READ MORE +

Which of the following would BEST accomplish this task?

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task? A. Differential backup B. Off-site backup C. Incremental backup D. Full backupView AnswerAnswer: A Explanation: A. Differential backup - Differential backups...

March 3, 2024 No Comments READ MORE +

Which of the following describes this incident?

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . PretextingB . SpoofingC . VishingD . ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...

March 3, 2024 No Comments READ MORE +