Loading questions...
Updated
After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled.
Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)
A new business will be using credit cards in a physical location as well as its web presence.
Which of the following does the business need?
A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point.
Which of the following should the technician do NEXT?
A user's smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car.
Which of the following troubleshooting steps should the technician take NEXT?
A company's security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user.
Which of the following commands should the administrator run on the user's workstation?
A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive.
Which of the following actions should the IT department perform NEXT?
Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?
Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server.
Which of the following is the FIRST step the technician should take to correct this issue?
A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon.
Which of the following actions should the user take FIRST?
A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company's AUP.
Which of the following would be the NEXT appropriate act?
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.
Which of the following Control Panel utilities should the technician use to configure the setting?
A technician is disposing of computer hardware that contains PHI. The drive must be reusable.
Which of the following methods should be used?
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)
A network administrator needs to be able to securely connect to a local router from within the office.
Which of the following protocols should the administrator ensure is enabled on the router?
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter J assigned only to the drive.
Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?
Users notify the help desk of an email that was just received. The email came from the help desk's email address and asked the users to click on an embedded link.
This email is BEST described as:
A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:
There are 1033 infected files on this computer. Click here to disinfect.
The link is blocked by the corporate content filter and displays a message stating the site contains known malware.
Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?
A user's corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email.
Which of the following is MOST likely causing the missing folders issue?
During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade.
Which of the following plans must be implemented to revert back to the most recent version of the firmware?
An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement.
Which of the following should the technician do NEXT?
Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
A new company policy states that all end-user access to network resources will be controlled based on the users' roles and responsibilities within the organization.
Which of the following security concepts has the company just enabled?
SIMULATION -
A technician has installed two new drives in one of the computers in the computer lab. Disk1 will be utilized for user and application data. Disk 2 has already been properly configured and has production data on in. The technician has been unable to format the appropriate disk from the command prompt.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.
The new partitions must be formatted to ensure that user's files can be secured from other users and that the disk must be configured to account for future redundancy.
Make sure to maintain a consistent file system.
INSTRUCTIONS:
Conduct the necessary steps within the Disk Manager to accomplish these tasks.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.
Which of the following needs to be adjusted on the workstation to fix the issue?