A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method
A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure methodA . Reinstalling Windows B. Performing a quick format C. Using disk-wiping software D. Deleting all files from command-line interfaceView AnswerAnswer: C
Which of the following should be updated to reflect this new requirement?
A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?A . MDM B. EULA C. IRP D. AUPView AnswerAnswer: D
Which of the following is a proprietary Cisco AAA protocol?
Which of the following is a proprietary Cisco AAA protocol?A . TKIP B. AES C. RADIUS D. TACACS+View AnswerAnswer: D
Which of the following file types will the technician MOST likely use?
A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?A . .deb B. .vbs C. .exe D. .appView AnswerAnswer: D
Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?
A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?A . Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image the...
Which of the following tools should the help desk technician use to remove the malicious software?
A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).A . File Explorer B. User Account Control C. Windows Backup and Restore D. Windows Firewall E. Windows...
Which of the following’s tools should the technician use to accomplish this task?
A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the following’s tools should the technician use to accomplish this task?A . Consoltf B. Disk Utility C. Time Machine D. FileVaultView AnswerAnswer: B
Which of the following practices should the technician use to make sure the ticket is associated with the correct user?
When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?A . Have the user provide a callback phone number to be added...
Which of the following is an example of MFA?
Which of the following is an example of MFA?A . Fingerprint scan and retina scan B. Password and PIN C. Username and password D. Smart card and passwordView AnswerAnswer: B
Which of the following would BEST mitigate this threat?
The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?A . Encryption at rest B. Account lockout C. Automatic screen lock D. AntivirusView AnswerAnswer: B