Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is a Linux command that is used for administrative purposes?

A.

runas

B.

cmcl

C.

net user

D.

su

MFA for a custom web application on a user ' s smartphone is no longer working. The last time the user remembered it working was before taking a vacation to another country. Which of the following should the technician do first?

A.

Verify the date and time settings

B.

Apply mobile OS patches

C.

Uninstall and reinstall the application

D.

Escalate to the website developer

Thousands of compromised machines are attempting to make fake purchases from an online store. Which of the following is taking place?

A.

Brute-force attack

B.

Spoofing

C.

DDoS

D.

SQL injection

A business is hiring a remote employee and must provide the employee with graphical interface access to the in-house Linux servers. Which of the following should the business use for this process?

A.

SSH

B.

VNC

C.

WinRM

D.

Telnet

A network technician notices that most of the company ' s network switches are now end-of-life and need to be upgraded. What should the technician do first?

A.

Implement the change

B.

Approve the change

C.

Document the change

D.

Schedule the change

A technician is working on a complex, large-scale software deployment. In which of the following places would the technician most likely reference deployment instructions?

A.

File server

B.

User ' s desktop

C.

Email

D.

Internal wiki

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

A.

Disable built-in hotspots.

B.

Configure VPN software.

C.

Install an antivirus application.

D.

Use PIN authentication.

E.

Turn on location services.

F.

Enable screen timeout.

Company employees do not have assigned workspaces and regularly work at different computers and physical locations. Which of the following should the company implement to maintain data security and minimize the amount of user data that needs to be transferred?

A.

Centralized certificate storage

B.

Cloud email

C.

Portable drives

D.

Roaming profiles

A user logs in daily and cannot print a report. Help desk fixes it each day, but the issue recurs. What should be done so the issue doesn’t recur? (Select two)

A.

Set the print spooler to have no dependencies

B.

Set the print spooler recovery to take no action

C.

Start the printer extensions and notifications service

D.

Start the print spooler service

E.

Set the print spooler to Automatic

F.

Set the print spooler log-on to the user ' s account

A technician is helping a remote user. The technician asks the user to open a specific folder on the root directory of the computer. The user cannot find a folder with that name. The technician explains that a few settings are needed to allow the folder to appear. Which of the following should the user do to be able to see the folder? (Select two).

A.

Adjust the display properties

B.

Open File Explorer

C.

Open the root drive properties

D.

Configure the system settings

E.

Set the view extensions to " on "

F.

Check the box to view hidden files