Which of the following should the technician confirm NEXT as part of the troubleshooting process?

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which...

March 6, 2024 No Comments READ MORE +

Which of the following would BEST mitigate this threat?

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?A . Encryption at restB . Account lockoutC . Automatic screen lockD . AntivirusView AnswerAnswer: B Explanation:...

March 5, 2024 No Comments READ MORE +

Which of the following should the technician verify in the command prompt to address the issue without making any changes?

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?A . Run sfc / scannow on the drive as the administrator.B . Run clearnmgr on the drive...

March 5, 2024 No Comments READ MORE +

Which of the following could be used to implement secure physical access to a data center?

Which of the following could be used to implement secure physical access to a data center?A . GeofenceB . Alarm systemC . Badge readerD . Motion sensorView AnswerAnswer: C Explanation: Badge readers are used to implement secure physical access to a data center. They are used to read the identification...

March 5, 2024 No Comments READ MORE +

Which of the following is used as a password manager in the macOS?

Which of the following is used as a password manager in the macOS?A . TerminalB . FileVaultC . PrivacyD . KeychainView AnswerAnswer: D Explanation: Keychain is a feature of macOS that securely stores passwords, account numbers, and other confidential information for your Mac, apps, servers, and websites1. You can use...

March 4, 2024 No Comments READ MORE +

Which of the following types of malware is the system MOST likely infected with?

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%. Which of the following types of malware is the system MOST likely infected with?A . KeyloggerB . RootkitC...

March 4, 2024 No Comments READ MORE +

Which of the following backup methods would BEST address these concerns?

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?A . FullB . DifferentialC . Off-siteD . Grandfather-father-sonView AnswerAnswer: B Explanation: The...

March 4, 2024 No Comments READ MORE +

Which of the following should a technician do to allow access?

A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?A . Adjust the content filtering.B . Unmap port forwarding.C . Disable unused ports.D . Reduce the encryption strengthView AnswerAnswer: A Explanation: Content filtering is a process that manages...

March 4, 2024 No Comments READ MORE +

Which of the following is the MOST deficient way lor the owner to install the application?

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application? A. Use...

March 3, 2024 No Comments READ MORE +

Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?A . Use a key combination to lock the computer when leaving.B . Ensure no unauthorized personnel are in the...

March 3, 2024 No Comments READ MORE +