Which of the following types of malware is the system MOST likely infected with?

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%. Which of the following types of malware is the system MOST likely infected with?A . KeyloggerB . RootkitC...

March 4, 2024 No Comments READ MORE +

Which of the following backup methods would BEST address these concerns?

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?A . FullB . DifferentialC . Off-siteD . Grandfather-father-sonView AnswerAnswer: B Explanation: The...

March 4, 2024 No Comments READ MORE +

Which of the following should a technician do to allow access?

A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?A . Adjust the content filtering.B . Unmap port forwarding.C . Disable unused ports.D . Reduce the encryption strengthView AnswerAnswer: A Explanation: Content filtering is a process that manages...

March 4, 2024 No Comments READ MORE +

Which of the following is the MOST deficient way lor the owner to install the application?

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application? A. Use...

March 3, 2024 No Comments READ MORE +

Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?A . Use a key combination to lock the computer when leaving.B . Ensure no unauthorized personnel are in the...

March 3, 2024 No Comments READ MORE +

Which of the following would BEST accomplish this task?

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task? A. Differential backup B. Off-site backup C. Incremental backup D. Full backupView AnswerAnswer: A Explanation: A. Differential backup - Differential backups...

March 3, 2024 No Comments READ MORE +

Which of the following describes this incident?

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . PretextingB . SpoofingC . VishingD . ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...

March 3, 2024 No Comments READ MORE +

Which of the following tools should the technician use to resolve this issue?

A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?A . taskschd.mscB . eventvwr.mscC . de vmgmt. mscD . diskmgmt.mscView AnswerAnswer: C Explanation: The tool that the technician should use to resolve...

March 3, 2024 No Comments READ MORE +

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?A . Remote AssistanceB . Remote Desktop ProtocolC . Screen SharingD . Virtual Network ComputingView AnswerAnswer: C Explanation: Screen Sharing is the default system tool that can...

March 3, 2024 No Comments READ MORE +

Which of the following is MOST likely contained in an EULA?

Which of the following is MOST likely contained in an EULA?A . Chain of custodyB . Backup of software codeC . Personally identifiable informationD . Restrictions of useView AnswerAnswer: D Explanation: An EULA (End-User License Agreement) is a legally binding contract between a software supplier and a customer or end-user,...

March 3, 2024 No Comments READ MORE +