Which of the following is MOST likely the cause of this issue?
While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST...
Which of the following features BEST addresses the user's concern?
A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern? A. Remote wipe B. Anti-maIware C. Device encryption D....
Which of the following is used as a password manager in the macOS?
Which of the following is used as a password manager in the macOS?A . TerminalB . FileVaultC . PrivacyD . KeychainView AnswerAnswer: D Explanation: Keychain is a feature of macOS that securely stores passwords, account numbers, and other confidential information for your Mac, apps, servers, and websites1. You can use...
Which of the following steps should the technician complete BEFORE removing the virus?
A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?A . Disable System Restore.B . Schedule a malware scan.C . Educate the end user.D . Run Windows Update.View AnswerAnswer: A Explanation: Before...
Which of the following backup methods should the technician MOST likely implement?
A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which...
Which of the following could be used to implement secure physical access to a data center?
Which of the following could be used to implement secure physical access to a data center?A . GeofenceB . Alarm systemC . Badge readerD . Motion sensorView AnswerAnswer: C Explanation: Badge readers are used to implement secure physical access to a data center. They are used to read the identification...
Which of the following operating systems is MOST likely installed on the netbook?
A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook?A . macOSB . LinuxC . Chrome OSD . WindowsView AnswerAnswer: C Explanation:
Which of the following is the BEST course of action for the support center representative to take?
A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service....
Which of the following should the technician do NEXT?
A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser...
Which of the following backup methods would BEST address these concerns?
A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?A . FullB . DifferentialC . Off-siteD . Grandfather-father-sonView AnswerAnswer: B Explanation: The...