Which of the following BEST describes the technician's actions?
A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?A . Avoid distractionsB . Deal appropriately with customer's confidential material.C . Adhere to user privacy policyD...
Which of the following is a data security standard for protecting credit cards?
Which of the following is a data security standard for protecting credit cards?A . PHIB . NISTC . PCID . GDPRView AnswerAnswer: C Explanation: The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or...
Which of the following tools should the technician use to make adjustments?
A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the...
Which of the following should the support technician do to BEST resolve the situation?
A customer called the help desk to report that a machine that was recently updated is no longer working. The support technician checks the latest logs to see what updates were deployed, but nothing was deployed in more than three weeks. Which of the following should the support technician do...
Which of the following troubleshooting steps should the user perform FIRST?
A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?A . Delete the application's cache.B . Check for application updates.C . Roll back the OS update.D . Uninstall and...
Which of the following should the technician confirm NEXT as part of the troubleshooting process?
A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which...
Which of the following would BEST mitigate this threat?
The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?A . Encryption at restB . Account lockoutC . Automatic screen lockD . AntivirusView AnswerAnswer: B Explanation:...
Which of the following should the technician verify in the command prompt to address the issue without making any changes?
A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?A . Run sfc / scannow on the drive as the administrator.B . Run clearnmgr on the drive...
Which of the following could be used to implement secure physical access to a data center?
Which of the following could be used to implement secure physical access to a data center?A . GeofenceB . Alarm systemC . Badge readerD . Motion sensorView AnswerAnswer: C Explanation: Badge readers are used to implement secure physical access to a data center. They are used to read the identification...
Which of the following is used as a password manager in the macOS?
Which of the following is used as a password manager in the macOS?A . TerminalB . FileVaultC . PrivacyD . KeychainView AnswerAnswer: D Explanation: Keychain is a feature of macOS that securely stores passwords, account numbers, and other confidential information for your Mac, apps, servers, and websites1. You can use...