A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method

A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure methodA . Reinstalling Windows B. Performing a quick format C. Using disk-wiping software D. Deleting all files from command-line interfaceView AnswerAnswer: C

February 14, 2023 No Comments READ MORE +

Which of the following should be updated to reflect this new requirement?

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?A . MDM B. EULA C. IRP D. AUPView AnswerAnswer: D

February 14, 2023 No Comments READ MORE +

Which of the following is a proprietary Cisco AAA protocol?

Which of the following is a proprietary Cisco AAA protocol?A . TKIP B. AES C. RADIUS D. TACACS+View AnswerAnswer: D

February 13, 2023 No Comments READ MORE +

Which of the following file types will the technician MOST likely use?

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?A . .deb B. .vbs C. .exe D. .appView AnswerAnswer: D

February 13, 2023 No Comments READ MORE +

Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?A . Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image the...

February 13, 2023 No Comments READ MORE +

Which of the following tools should the help desk technician use to remove the malicious software?

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).A . File Explorer B. User Account Control C. Windows Backup and Restore D. Windows Firewall E. Windows...

February 12, 2023 No Comments READ MORE +

Which of the following’s tools should the technician use to accomplish this task?

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the following’s tools should the technician use to accomplish this task?A . Consoltf B. Disk Utility C. Time Machine D. FileVaultView AnswerAnswer: B

February 12, 2023 No Comments READ MORE +

Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?A . Have the user provide a callback phone number to be added...

February 11, 2023 No Comments READ MORE +

Which of the following is an example of MFA?

Which of the following is an example of MFA?A . Fingerprint scan and retina scan B. Password and PIN C. Username and password D. Smart card and passwordView AnswerAnswer: B

February 11, 2023 No Comments READ MORE +

Which of the following would BEST mitigate this threat?

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?A . Encryption at rest B. Account lockout C. Automatic screen lock D. AntivirusView AnswerAnswer: B

February 11, 2023 No Comments READ MORE +