A user reports a computer is running slow.
A user reports a computer is running slow. Which of the following tools will help a technician identity the issuedA . Disk Cleanup B. Group Policy Editor C. Disk Management D. Resource MonitorView AnswerAnswer: D Explanation: Resource Monitor will help a technician identify the issue when a user reports a...
Which of the following is the STRONGEST wireless configuration?
Which of the following is the STRONGEST wireless configuration?A . WPS B. WPA3 C. WEP D. WMNView AnswerAnswer: B Explanation: The strongest wireless configuration is B. WPA3. WPA3 is the most up-to-date wireless encryption protocol and is the most secure choice. It replaces PSK with SAE, a more secure way...
Which of the following backup methods would BEST address these concerns?
A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?A . Full B. Differential C. Off-site D. Grandfather-father-sonView AnswerAnswer: B Explanation: The...
Which of the following technologies can be implemented to prevent this issue?
A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?A . Signed system images B. Antivirus C. SSO D. MDMView AnswerAnswer: D Explanation: MDM stands for...
Which of the following describes this incident?
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . Pretexting B. Spoofing C. Vishing D. ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...
Which of the following should a technician do to allow access?
A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?A . Adjust the content filtering. B. Unmap port forwarding. C. Disable unused ports. D. Reduce the encryption strengthView AnswerAnswer: A Explanation: Content filtering is a process that manages...
Which of the following configurations should the technician employ to achieve this goal?
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?A . Configure the network as private B. Enable...
Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...
Which of the following is causing the login issue?
A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?A...
Which of the following should the technician implement?
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?A . MSRA B. VNC C. VPN D. SSHView AnswerAnswer: C Explanation: A technician needs to interconnect two offices to the main branch while...