Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?

A.

Data integrity form

B.

Valid operating system license

C.

Documentation of an incident

D.

Chain of custody

The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check first to troubleshoot this issue? (Select two).

A.

Screen resolution

B.

Screen zoom

C.

Screen timeout

D.

Screen brightness

E.

Screen damage

F.

Screen motion smoothness

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

A.

Preserving chain of custody

B.

Implementing data protection policies

C.

Informing law enforcement

D.

Creating a summary of the incident

A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?

A.

AAA

B.

SSH

C.

RDP

D.

VPN

A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Select two).

A.

Implementing data-at-rest encryption

B.

Disabling AutoRun

C.

Restricting user permissions

D.

Restricting log-in times

E.

Enabling a screen lock

F.

Disabling local administrator accounts

A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company's risk to avoid any issues. Which of the following items should the technician implement?

A.

Screened subnet

B.

Firewall

C.

Anti-phishing training

D.

Antivirus

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

A.

nslookup

B.

net use

C.

netstat

D.

net user

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

A.

USB drive

B.

DVD Installation media

C.

PXE boot

D.

Recovery partition

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

A technician is selling up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements?

A.

Biometrics

B.

Soft token

C.

Access control lists

D.

Smart card

A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?

A.

Network and Sharing Center

B.

net use

C.

User Accounts

D.

regedit

E.

Group Policy

Which of the following are mobile operating systems used on smartphones? (Select two).

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

An Internet cafe has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?

A.

Spyware is redirecting browser searches.

B.

A cryptominer is verifying transactions.

C.

Files were damaged from a cleaned virus infection.

D.

A keylogger is capturing user passwords.

A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

A technician is trying to encrypt a single folder on a PC. Which of the following should the technician use to accomplish this task?

A.

FAT32

B.

exFAT

C.

BitLocker

D.

EFS

A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Select two).

A.

Zombies

B.

Keylogger

C.

Adware

D.

Botnet

E.

Ransomware

F.

Spyware

The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Calibrate the phone sensors.

B.

Enable the touch screen.

C.

Reinstall the operating system.

D.

Replace the screen.

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

A.

Disable System Restore.

B.

Educate the end user.

C.

Install the latest OS patches.

D.

Clean the environment reinstallation.