Which of the following encryption technologies should be used to secure the workstation in case of theft?
A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?A . Data-in-transit encryption B. File encryption C....
Which of the following tools will help a technician identity the issued?
A user reports a computer is running slow. Which of the following tools will help a technician identity the issued?A . Disk Cleanup B. Group Policy Editor C. Disk Management D. Resource MonitorView AnswerAnswer: D
Which of the following steps should the systems administrator most likely attempt NEXT?
A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?A ....
Which of the following could be used to implement secure physical access to a data center?
Which of the following could be used to implement secure physical access to a data center?A . Geofence B. Alarm system C. Badge reader D. Motion sensorView AnswerAnswer: A
Which of the following tools can be used?
A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?A . afc B. ehkdsk C. git clone D. zobocopyView AnswerAnswer: A
Which of the following explains why the OS can only access 46B of RAM?
A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?A . The UEFI...
Which of the following should be updated before requesting approval again?
A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?A . Scope of change B. Risk level C. Rollback plan D. End user acceptanceView AnswerAnswer: C
Which of the following has infected the computer?
A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?A . Cryptominer B....
Which of the following explains why the technician unable to find this menu item?
A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician unable to find this menu item?A . The hardware does not meet BitLocker's minimum system requirements. B....
Which of the following options describes how to set up Windows Hello Fingerprint foe the user?
A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up...