Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message " No operating system found. " The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Which of the following must be followed during incident response to ensure the collected evidence is properly handled and accounted for?

A.

Order of volatility for data

B.

Law enforcement notification procedures

C.

Data integrity best practices

D.

Chain of custody process

Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?

A.

Spoofing

B.

Brute-force

C.

DoS

D.

Zero-day

Which of the following is used in addition to a password to implement MFA?

A.

Sending a code to the user ' s phone

B.

Verifying the user ' s date of birth

C.

Prompting the user to solve a simple math problem

D.

Requiring the user to enter a PIN

An endpoint ' s screensaver no longer activates automatically. The global security policy states that the screensaver should activate after the endpoint has been idle for an hour. Which of the following commands should the technician run on the endpoint to investigate this issue?

A.

msinfo32.exe

B.

gpresult

C.

sfc /scannow

D.

whoami

An administrator requires information about a server to identify the product owner and whether it has any business-critical services. Which of the following can the administrator refer to in order to find this information?

A.

CMDB

B.

SLA

C.

SOP

D.

EULA

A technician uses AI to draft a document about new software benefits. Upon reading, the technician sees factually incorrect info. What term best describes this?

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

The screen of a previously working computer repeatedly displays an OS Not Found error message when the computer is started. Only a USB drive, a keyboard, and a mouse are plugged into the computer. Which of the following should a technician do first?

A.

Run data recovery tools on the disk

B.

Partition the disk using the GPT format

C.

Check boot options

D.

Switch from UEFI to BIOS

A technician verifies that a malware incident occurred on some computers in a small office. Which of the following should the technician do next?

A.

Quarantine the infected systems

B.

Educate the end users

C.

Disable System Restore

D.

Update the anti-malware and scan the computers