Weekend Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

A.

Make the user a member of Domain Admins.

B.

Add the user to the local Administrators group.

C.

Let the user use credentials from another user who has rights.

D.

Give the user the local, high-privileged account password.

Given the following information:

jdoe pizza

jdoe rock

jdoe guitar

Which of the following types of attacks is occurring?

A.

Dictionary

B.

Spoofing

C.

SQL injection

D.

DDoS

A vendor provided installation software on a DVD-ROM. The software is not available to download on the vendor’s website. The technician needs to install the software on several laptops that do not have an optical disc drive. The laptops are connected to the corporate network but are physically located at remote sites. Which of the following is the best installation method for the technician to use?

A.

Use a computer that has an optical disc drive to create an ISO file from the DVD-ROM, store the ISO file on the file server, connect remotely to each laptop, and install the software on each laptop using the ISO stored on the file server.

B.

Locate an external USB DVD-ROM optical disc drive, insert the DVD-ROM from the vendor into the drive, and install the software from the USB DVD-ROM optical disc drive.

C.

Use a computer that has an optical disc drive to create an ISO file from the DVD-ROM, copy the ISO file to a USB flash drive, and install the software from the USB flash drive.

D.

Locate an ISO file of the software from a website unrelated to the vendor, store the ISO file on the file server, connect remotely to each laptop, and install the software on each laptop using the ISO stored on the file server.

Which of the following Windows 10 editions is the most cost-effective and appropriate for a single user who needs to access their computer remotely?

A.

Education

B.

Pro

C.

Enterprise

D.

Home

Which of the following macOS file types requires mounting before installation?

A.

.pkg

B.

.zip

C.

.app

D.

.dmg

A technician needs to override DNS and map IP addresses and URLs to different locations. Which of the following should the technician do?

A.

Install signal repeaters.

B.

Edit the hosts file.

C.

Configure the firewall.

D.

Enable port forwarding.

An application is not performing well and will occasionally shut down with no error provided. Which of the following Task Manager tabs should be used to troubleshoot the application while it is active?

A.

Users

B.

Services

C.

Performance

D.

Startup

Which of the following is the most significant drawback of using the WEP protocol for wireless security?

A.

Complex configuration process

B.

Slow data transfer speed

C.

Vulnerability to key-cracking attacks

D.

Incompatibility with older devices

A systems administrator receives notification about unauthorized access to company resources outside normal business hours. Which of the following security measures should the systems administrator implement to prevent further unauthorized use?

A.

Perimeter firewalls

B.

SSL-enabled DNS

C.

Anonymizing VPNs

D.

Multifactor authentication

Which of the following commands should a technician use to change user permissions?

A.

sudo

B.

chxod

C.

xv

D.

pwd

A technician is troubleshooting a user's PC that is displaying pop-up windows advertising free software downloads. When the technician tries to open a document, the system displays an error message: "Not enough memory to perform this operation." Which of the following should be the technician's next step to resolve this issue?

A.

Install antispyware

B.

Relmage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

A technician is configuring a specific NTP server for all company-issued laptops. These Windows 10 machines are not joined to an Active Directory domain. Which of the following setting areas would be used for this adjustment?

A.

System

B.

Update and Security

C.

Network and Internet

D.

Time and Language

A workstation's hard drive is making loud noises, applications are running slowly, and the workstation is rebooting unexpectedly. Which of the following should the technician do first to begin troubleshooting the issue?

A.

Perform a System Restore.

B.

Open Disk Cleanup.

C.

Replace the hard drive.

D.

Run CHKDSK.

An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures would further reduce the risk of unauthorized data access?

A.

Remote backups

B.

Location tracking

C.

PIN code screen lock

D.

Device encryption

A change management review board denied an administrator's request for change. The administrator had provided the purpose and scope of the change, the date and time, and impacted systems with the risk analysis. Which of the following should be included to approve this change?

A.

End-user acceptance

B.

Cost analysis

C.

Rollback plan

D.

Standard maintenance window

A user calls the help desk to report an issue with their smartphone. After the user returns from a business trip, the user is no longer able to access email or visit websites without a Wi-Fi connection on the smartphone. Which of the following could the user do to most likely resolve the issue?

A.

Enable cellular data.

B.

Increase data limits.

C.

Disconnect the VPN.

D.

Reinstall the SIM card.

A technician needs to import a new digital certificate and place it in the proper location. Which of the following Control Panel utilities should the technician use to import the certificate?

A.

Internet Options

B.

Network and Sharing Center

C.

Credential Manager

D.

Security and Maintenance

While accessing a website, a user clicks on a menu option and nothing happens. Which of the following actions should the user take to most likely resolve this issue?

A.

Enable TLS 1.0 in the browser.

B.

Enable private-browsing mode.

C.

Disable pop-up blocker.

D.

Clear the cache.

Which of the following is protected by government policy for end-user information?

A.

DRM

B.

EULA

C.

PCI

D.

PII

Which of the following is the weakest wireless security protocol?

A.

WEP

B.

WPA2

C.

TKIP

D.

AES