Which of the following steps should the technician complete BEFORE removing the virus?
A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?A . Disable System Restore.B . Schedule a malware scan.C . Educate the end user.D . Run Windows Update.View AnswerAnswer: A Explanation: Before...
Which of the following should a technician investigate NEXT to resolve the issue?
A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?A . Enable firewall ACLs.B . Examine the localhost file entries.C . Verify...
Which of the following is MOST likely the cause of the user's issue?
A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?A . KeyloggerB . CryptominersC . VirusD ....
Which of the following should a support technician check FIRST?
A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?A . User account statusB . Mobile OS versionC . Data plan coverageD ....
Which of the following should the technician perform NEXT to troubleshoot the issue?
A user is unable to access a website, which is widely used across the organization, and receives the following error message: The security certificate presented by this website has expired or is not yet valid. The technician confirms the website works when accessing it from another computer but not from...
Which of the following commands should the technician use?
A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?A . ipconfigB . ifconfigC . arpaD . pingView AnswerAnswer: B Explanation: ifconfig is a command-line utility that allows you to configure network interfaces on macOS...
Which of the following is MOST likely the cause of this issue?
While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST...
Which of the following is the MOST effective method to accomplish this task?
A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?A . DegaussingB . Low-level formattingC . RecyclingD . ShreddingView AnswerAnswer: D Explanation: Shredding is the most effective method to securely dispose of data stored on...
Which of the following backup methods would BEST meet the requirements?
An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?A ....
Which of the following attacks MOST likely occurred?
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute forceB . Zero dayC . Denial of serviceD . On-pathView AnswerAnswer: B Explanation: A zero-day attack...