Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

A.

Turn on airplane mode.

B.

Set the connection to be metered.

C.

Configure the device to use a static IP address.

D.

Enable the Windows Defender Firewall.

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?

A.

Event Viewer

B.

System Configuration

C.

Device Manager

D.

Performance Monitor

A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?

A.

Delete the browser cookies and history.

B.

Reset all browser settings.

C.

Change the browser default search engine.

D.

Install a trusted browser.

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

    SSID

A.

DHCP

B.

Firewall

C.

SSD

Which of the following is the default GUI and file manager in macOS?

A.

Disk Utility

B.

Finder

C.

Dock

D.

FileVault

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

A.

Installing a VPN

B.

Implementing location tracking

C.

Configuring remote wipe

D.

Enabling backups

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?

A.

Disable System Restore.

B.

Remediate the system.

C.

Educate the system user.

D.

Quarantine the system.

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

    Standard operating procedure

A.

Acceptable use policy

B.

Security protocols

C.

Data flow diagram

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

A.

Educate the end user on best practices for security.

B.

Quarantine the host in the antivirus system.

C.

Investigate how the system was infected with malware.

D.

Create a system restore point.

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

A.

To determine which party had the machine and when.

B.

To remotely wipe sensitive data from the machine.

C.

To gather the information needed to replace the machine.

D.

To alert the owner that the password needs to be changed.

A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?

A.

EFS

B.

GPT

C.

MBR

D.

FAT32

Which of the following defines the extent of a change?

A.

Scope

B.

Purpose

C.

Analysis

D.

Impact

Which of the following items require special e-waste recycling? (Select two).

    Solid-state drive

A.

A/C adapter

B.

Surge protector

C.

Laptop battery

D.

CRT monitor

E.

Power supply

Which of the following commands can a technician use to get the MAC address of a Linux distribution?

    net use

A.

ifconfig

B.

netstat

C.

ping