Which of the following has infected the computer?
A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?A . Cryptominer B....
Which of the following explains why the technician unable to find this menu item?
A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician unable to find this menu item?A . The hardware does not meet BitLocker's minimum system requirements. B....
Which of the following options describes how to set up Windows Hello Fingerprint foe the user?
A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up...
Which of the following would MOST likely resolve the issue?
A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?A . Quarantining system files B. Reimaging the workstation C. Encrypting the hard drive D....
Which of the following describes this incident?
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . Pretexting B. Spoofing C. Vishing D. ScarewareView AnswerAnswer: C
A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method
A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure methodA . Reinstalling Windows B. Performing a quick format C. Using disk-wiping software D. Deleting all files from command-line interfaceView AnswerAnswer: C
Which of the following should be updated to reflect this new requirement?
A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?A . MDM B. EULA C. IRP D. AUPView AnswerAnswer: D
Which of the following is a proprietary Cisco AAA protocol?
Which of the following is a proprietary Cisco AAA protocol?A . TKIP B. AES C. RADIUS D. TACACS+View AnswerAnswer: D
Which of the following file types will the technician MOST likely use?
A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?A . .deb B. .vbs C. .exe D. .appView AnswerAnswer: D
Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?
A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?A . Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image the...