Which of the following backup methods would BEST address these concerns?

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?A . FullB . DifferentialC . Off-siteD . Grandfather-father-sonView AnswerAnswer: B Explanation: The...

August 1, 2024 No Comments READ MORE +

Which of the following would BEST mitigate this threat?

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?A . Encryption at restB . Account lockoutC . Automatic screen lockD . AntivirusView AnswerAnswer: B Explanation:...

August 1, 2024 No Comments READ MORE +

Which of the following explains why the technician unable to find this menu item?

A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician unable to find this menu item?A . The hardware does not meet BitLocker's minimum system requirements.B ....

August 1, 2024 No Comments READ MORE +

Which of the following describes this incident?

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . PretextingB . SpoofingC . VishingD . ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...

August 1, 2024 No Comments READ MORE +

Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability...

August 1, 2024 No Comments READ MORE +

Which of the following change management documents includes how to uninstall a patch?

Which of the following change management documents includes how to uninstall a patch?A . Purpose of changeB . Rollback planC . Scope of changeD . Risk analysisView AnswerAnswer: B Explanation: The change management document that includes how to uninstall a patch is called the “rollback plan”. The rollback plan is...

August 1, 2024 No Comments READ MORE +

Which of the following should the technician use to mitigate this issue?

A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?A . Surge suppressorB . Battery backupC . CMOS batteryD...

July 31, 2024 No Comments READ MORE +

Which of the following should the technician MOST likely have done to prevent damage?

A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?A . Removed all jewelryB . Completed an inventory of tools before useC . Practiced electrical fire...

July 31, 2024 No Comments READ MORE +

Which of the following BEST describes the technician's actions?

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?A . Avoid distractionsB . Deal appropriately with customer's confidential material.C . Adhere to user privacy policyD...

July 31, 2024 No Comments READ MORE +

Which of the following should the technician do NEXT?

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser...

July 31, 2024 No Comments READ MORE +