A computer technician is implementing a solution to support a new internet browsing policy for a customer's business. The policy prohibits users from accessing unauthorized websites based on categorization. Which of the following should the technician configure on the SOHO router?
Answer : C
Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method. Which of the following technologies should the technician use?
Answer : B
An end user's laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again. Which of the following should the technician do next?
Answer : C
Which of the following provides information to employees, such as permitted activities when using the organization's resources?
Answer : A
A technician needs to install an operating system on a large number of workstations. Which of the following is the fastest method?
Answer : D
A user is working from home and is unable to access work files on a company laptop. Which of the following should a technician configure to fix the network access issue?
Answer : D
A technician is troubleshooting an issue in which a service runs momentarily and stops at certain points in the process. The technician needs to determine the root cause of this issue. Which of the following tools should the technician use?
Answer : A
Which of the following is an example of an application publisher including undisclosed additional software in an installation package?
Answer : C
A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?
Answer : C
A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application. Which of the following should the help desk team do to prevent further unauthorized installations from occurring?
Answer : D
Which of the following is used in addition to a password to implement MFA?
Answer : A
A technician is preparing to replace the batteries in rack-mounted UPS system. After ensuring the power is turned off and the batteries are fully discharged, the technician needs to remove the battery modules from the bottom of the rack. Which of the following steps should the technician take?
Answer : B
A technician is setting up a surveillance system for a customer. The customer wants access to the system's web interface on the LAN via the system’s IP address. Which of the following should the technician use to prevent external log-in attempts from the internet?
Answer : A
A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?
Answer : A
Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us