Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?

A.

Respond to calls and text messages while on site but not when working directly with personnel.

B.

Respond to calls and text messages only from family.

C.

Respond to calls and text messages only when an emergency situation requires a response.

D.

Respond to calls and text messages discreetly while on site.

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

A.

Investigate the firewall logs.

B.

Isolate the machine from the network.

C.

Inspect the Windows Event Viewer.

D.

Take a physical inventory of the device.

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.

Which of the following security measures should the user take to ensure security and privacy?

A.

Only accept calls from known people.

B.

Disregard any suspicious emails.

C.

Update the antivirus software.

D.

Enable two-factor authentication.

E.

Install a malware scanner.

A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism?

    Do not notify the customer if arriving before the customer.

A.

Dismiss the customer and proceed with the after-hours work.

B.

Contact the customer if the technician is arriving late.

C.

Disclose the experience via social media.

Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?

A.

Regression

B.

Cloud

C.

Production

D.

Sandbox

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

A.

Windows

B.

Chrome OS

C.

Android

D.

iOS

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

A.

To determine which party had the machine and when.

B.

To remotely wipe sensitive data from the machine.

C.

To gather the information needed to replace the machine.

D.

To alert the owner that the password needs to be changed.

Which of the following is command options is used to display hidden files and directories?

A.

-a

B.

-s

C.

-lh

D.

-t

When trying to access a secure internal network, the user receives an error messaging stating, "There is a problem with this website's security certificate." The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?

A.

Reimage the system and install SSL.

B.

Install Trusted Root Certificate.

C.

Select View Certificates and then Install Certificate.

D.

Continue to access the website.

A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?

A.

Scan for malware and ransomware.

B.

Perform a system restore.

C.

Check the network utilization.

D.

Update the antivirus software.

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?

A.

Content filter

B.

Screened subnet

C.

Port forwarding

D.

Access control list

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team

implement?

A.

SSH

B.

VNC

C.

VPN

D.

RDP

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Disable applicable BIOS options.

B.

Load the system in safe mode.

C.

Start up using a flash drive OS and run System Repair.

D.

Enable Secure Boot and reinstall the system.