Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

A.

Quarantine the host in the antivirus system.

B.

Run antivirus scan tor malicious software.

C.

Investigate how malicious software was Installed.

D.

Reimage the computer.

A hard drive that previously contained PI I needs to be repurposed for a public access workstation. Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive?

A.

Shredding

B.

Degaussing

C.

Low-level formatting

D.

Recycling

A user identified that a program installed in a workstation does not have optional features enabled. Which of the following must the technician do to install the optional features?

A.

Goto Programs andFeatures, uninstall the program, and reinstallit.

B.

Goto AdministrativeTools and edit System Configuration.

C.

Goto AdministrativeTools and run Disk Cleanup.

D.

Goto Programs andFeatures, select the program, and click onChange.

A developer receives the following error while trying to install virtualization software on a workstation:

VTx not supported by system

Which of the following upgrades will MOST likely fix the issue?

A.

Processor

B.

Hard drive

C.

Memory

D.

Video card

An employee of Company X receives an email from ITdepartmint@companyx.com that appears to be from the local IT administrator. This email states that the employee's computer has been infected with a virus and an included link must be clicked to remove the virus. Which of the following actions should the employee take next?

A.

Click the link and follow all included directions to remove the virus.

B.

Contact the IT department to ask for additional direction.

C.

Forward the email to all users who the employee has shared files with.

D.

Delete the email and disregard any requested action.

E.

Reply to the email to ask for confirmation that the email is legitimate.

Which of the following should be enabled on a mobile device to prevent unauthorized access to data in case the device is lost or stolen? (Select two).

A.

Biometric authentication

B.

Remote wipe

C.

Encryption

D.

Device tracking

E.

Antivirus software

F.

VPN access

An organization has a goal to perform daily backups of a particular workstation and save them locally to the NAS. The organization needs to ensure these backup jobs are successful. Which of the following should the IT department do?

A.

Write scripts to rerun backups that fail.

B.

Store copies of the backups off site.

C.

Perform incremental backups instead.

D.

Set up alerts to be notified when backups fail.

A company wants to reduce the negative ecological impacts of its business and has decided to hire an e-waste company to dispose of equipment. Which of the following should the e-waste company provide the business7

A.

Non-disclosure agreement

B.

Certification of destruction

C.

Low-level formatting

D.

Shredding/drilling

An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures would further reduce the risk of unauthorized data access?

A.

Remote backups

B.

Location tracking

C.

PIN code screen lock

D.

Device encryption

A home office user wants to ensure a PC is backed up and protected against local natural disasters and hardware failures. Which of the following would meet the user's requirements?

A.

Using an agent-based cloud backup solution

B.

Implementing a grandfather-father-son backup rotation

C.

Automating backups to a local network share

D.

Saving files manually to an external drive

Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the following should the employees configure so the laptops can automatically connect wirelessly?

A.

Network and Internet settings

B.

Windows Firewall settings

C.

Devices and Printers

D.

Personalization settings

Which of the following methods is a way to superficially delete files on a hard drive?

A.

Drilling

B.

Degaussing

C.

Wiping

D.

Shredding

E.

Low-level formatting

A customer reports that an Android phone will not allow the use of contactless electronic payment. Which of the following needs to be enabled to resolve the issue?

A.

Wi-Fi

B.

Nearby share

C.

NFC

D.

Bluetooth

When a user is in the office, web pages are loading slowly on the user’s phone. Which of the following best explains this issue?

A.

Exceeded the data usage limit

B.

Sluggish response time

C.

Degraded network service

D.

Low storage space

A customer is explaining issues with a workstation to a technician. While the customer is listing the issues, the technician is browsing social media on a smartphone. Which of the following professionalism and communication techniques should the technician be using in this situation? (Select two).

A.

Follow up with the customer.

B.

Avoid personal interruptions.

C.

Provide proper documentation.

D.

Clarify customer statements.

E.

Actively listen and take notes.

F.

Maintain professional attire.