Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Calibrate the phone sensors.

B.

Enable the touch screen.

C.

Reinstall the operating system.

D.

Replace the screen.

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?

A.

Amount of system RAM

B.

NIC performance

C.

Storage IOPS

D.

Dedicated GPU

A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic Which of the following types of infections are the workstations most likely experiencing? (Select two)

A.

Zombies

B.

Keylogger

C.

Adware

D.

Botnet

E.

Ransomvvare

F.

Spyware

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?

A.

SSL key

B.

Preshared key

C.

WPA2 key

D.

Recovery key

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

A.

nslookup

B.

net use

C.

netstat

D.

net user

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

A.

compmgmt.msc

B.

regedit.exe

C.

explorer.exe

D.

taskmgt.exe

E.

gpmc.msc

F.

services.msc

A technician needs to establish a remote access session with a user who has a Windows workstation. The session must allow for simultaneous viewing of the workstation by both the user and technician. Which of the following remote access technologies should be used?

A.

RDP

B.

VPN

C.

SSH

D.

MSRA

Which of the following best describes when to use the YUM command in Linux?

A.

To add functionality

B.

To change folder permissions

C.

To show documentation

D.

To list file contents

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

A.

Windows updates

B.

DNS settings

C.

Certificate store

D.

Browser plug-ins

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

A.

Open-source software

B.

EULA

C.

Chain of custody

D.

AUP

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

A.

Preserving chain of custody

B.

Implementing data protection policies

C.

Informing law enforcement

D.

Creating a summary of the incident

A payroll workstation has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed. Which of the following backup methods should be used to provide fast data recovery in this situation?

A.

Full

B.

Differential

C.

Synthetic

D.

Incremental

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

A.

Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.

B.

Redeem the included activation key card for a product key.

C.

Insert a Windows USB hardware dongle and initiate activation.

D.

Activate with the digital license included with the device hardware.

Which of the following would most likely be used in a small office environment?

A.

Print server

B.

Virtualization

C.

Domain access

D.

Workgroup

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the best choice for accessing the necessary configuration to complete this goal?

A.

Security and Maintenance

B.

Network and Sharing Center

C.

Windows Defender Firewall

D.

Internet Options