Which of the following actions should the technician do FIRST?
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?A . Lock all devices in a closet. B. Ensure all devices are from the same manufacturer....
Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).
Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).A . Biometric lock B. Badge reader C. USB token D. Video surveillance E. Locking rack F. Access control vestibuleView AnswerAnswer: E,F
Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?
Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?A . Network and Sharing Center B. Programs and Features C. Default Apps D. Add or Remove ProgramsView...
Which of the following does this process describe?
A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?A . Rights management B. Audit trail C. Chain of custody D. Data integrityView AnswerAnswer: C
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?A . Home B. Pro for Workstations C. Enterprise D. ProView AnswerAnswer: D
Which of the following types of backups should be completed FIRST?
A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?A . Full B. Non-parity C. Differential D. IncrementalView AnswerAnswer: A
Which of the following has infected the computer?
A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?A . Cryptominer B....
Which of the following is MOST likely to be of concern to the IT manager?
An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?A . All updated software must be...
Which of the following Wi-Fi protocols is the MOST secure?
Which of the following Wi-Fi protocols is the MOST secure?A . WPA3 B. WPA-AES C. WEP D. WPA-TKIPView AnswerAnswer: A
Which of the following tools will help a technician identity the issued?
A user reports a computer is running slow. Which of the following tools will help a technician identity the issued?A . Disk Cleanup B. Group Policy Editor C. Disk Management D. Resource MonitorView AnswerAnswer: D