Which of the following methods does the technician use to force the program to close in macOS?

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?A . The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen...

March 8, 2024 No Comments READ MORE +

Which of the following should the technician do NEXT?

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser...

March 8, 2024 No Comments READ MORE +

Which of the following methods should the technician use to refresh the laptop?

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?A . Internet-based upgradeB . Repair installationC . Clean installD . USB repairE . In place upgradeView AnswerAnswer: C Explanation: The desktop...

March 8, 2024 No Comments READ MORE +

Which of the following troubleshooting steps should the user perform FIRST?

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?A . Delete the application's cache.B . Check for application updates.C . Roll back the OS update.D . Uninstall and...

March 8, 2024 No Comments READ MORE +

Which of the following attacks MOST likely occurred?

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute forceB . Zero dayC . Denial of serviceD . On-pathView AnswerAnswer: B Explanation: A zero-day attack...

March 8, 2024 No Comments READ MORE +

Which of the following operating systems is MOST likely installed on the netbook?

A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook?A . macOSB . LinuxC . Chrome OSD . WindowsView AnswerAnswer: C Explanation:

March 8, 2024 No Comments READ MORE +

Which of the following tools can be used?

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used? A. afc B. ehkdsk C. git clone D. zobocopyView AnswerAnswer: D Explanation: A. scp...

March 8, 2024 No Comments READ MORE +

Which of the following steps should the technician take NEXT?

A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which of the following steps should the technician take NEXT?A . Quarantine the computer.B . use a previous restore point,C . Educate the end user about virusesD . Download the latest...

March 8, 2024 No Comments READ MORE +

A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning devices also turned off

DRAG DROP A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping,...

March 8, 2024 No Comments READ MORE +

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO). A. A new IT policy requires users to set up a lock screen PIN. B. A user is overseas and wants to use a compatible international SIM Card. C. A user left the phone...

March 8, 2024 No Comments READ MORE +