Podcast
Questions and Answers
how to fix "no boot device" found error
how to fix "no boot device" found error
- Reinstall windows os
- go with automated repair installation
- check bios (correct)
- replace the HDD drive
a company experiences DDOS attack several internal pc are source of traffic select two
a company experiences DDOS attack several internal pc are source of traffic select two
- botnet (correct)
- zombies (correct)
- spyware
- keylogger
- Ransomware
which file system used for journaling
which file system used for journaling
- NTFS (correct)
- fat32
- EXFAT32
- EXT4
web browsing speed on customers phone slows down every few weeks and then returns to normal after 3 days or 4 days. which of following should IT person do first to troubleshoot
web browsing speed on customers phone slows down every few weeks and then returns to normal after 3 days or 4 days. which of following should IT person do first to troubleshoot
what should a technician do if there is a virus over the network
what should a technician do if there is a virus over the network
A technician has been tasked with migrating team of users to windows 11 they have been asked to preserve their files but no problems or issues persist
A technician has been tasked with migrating team of users to windows 11 they have been asked to preserve their files but no problems or issues persist
which of following file system formats would be best choice to ensure read nad write of USB flash drive across generations of MS operating systems.
which of following file system formats would be best choice to ensure read nad write of USB flash drive across generations of MS operating systems.
what protocol number does email uses
what protocol number does email uses
you need to recommend the best back up method that will protect against ransomware attacks only a few files regularly modified However storage space is concern
you need to recommend the best back up method that will protect against ransomware attacks only a few files regularly modified However storage space is concern
you need to establish back up method for workstation that requires two sets of tapes to restore
you need to establish back up method for workstation that requires two sets of tapes to restore
you have problem with users constantly forget their passports to their mobile device and apps
you have problem with users constantly forget their passports to their mobile device and apps
What will a EULA most likely address?
What will a EULA most likely address?
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?
You are deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in addition to the user's existing username and password. How does this improve network security?
You are deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in addition to the user's existing username and password. How does this improve network security?
You are preparing an existing Windows 10 laptop for a new employee to use. What can you do to refresh the laptop?
You are preparing an existing Windows 10 laptop for a new employee to use. What can you do to refresh the laptop?
What should you implement to prevent users from enabling virtual technology on their laptops?
What should you implement to prevent users from enabling virtual technology on their laptops?
You need to provide remote support to a user’s desktop. Which tool would let you see the issue along with the user? (Choose two)
You need to provide remote support to a user’s desktop. Which tool would let you see the issue along with the user? (Choose two)
You are trying to deploy software to a large group of computers. You locate a script on the Internet that can perform this task, however you do not understand the scripting language. What best describes the risk you take in running the script?
You are trying to deploy software to a large group of computers. You locate a script on the Internet that can perform this task, however you do not understand the scripting language. What best describes the risk you take in running the script?
You are installing new network equipment in a small office. You want to make sure the equipment is secured against external Internet threats. What should you do first?
You are installing new network equipment in a small office. You want to make sure the equipment is secured against external Internet threats. What should you do first?
You're unable to access a website. You have confirmed that the website is online. Which of the following would most likely resolve the problem?
You're unable to access a website. You have confirmed that the website is online. Which of the following would most likely resolve the problem?
Your client has a 10-year-old SOHO wireless router. You want to configure it for the most secure wireless network possible. What would you choose?
Your client has a 10-year-old SOHO wireless router. You want to configure it for the most secure wireless network possible. What would you choose?
Your new wireless network is experiencing interference from other nearby SSIDs. What can you do to resolve the interference?
Your new wireless network is experiencing interference from other nearby SSIDs. What can you do to resolve the interference?
You are deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in addition to the user's existing username and password. How does this improve network security?
You are deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in addition to the user's existing username and password. How does this improve network security?
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?
A bank wants to enhance building security. They want to prevent vehicles from being able to drive into the building, while still making it easy for customers to enter. What do they need to implement?
A bank wants to enhance building security. They want to prevent vehicles from being able to drive into the building, while still making it easy for customers to enter. What do they need to implement?
A user's account was successfully breached over the weekend. The log shows that 500 logon attempts, each with a different password, occurred before the attack succeeded. What is the best way to mitigate this threat?
A user's account was successfully breached over the weekend. The log shows that 500 logon attempts, each with a different password, occurred before the attack succeeded. What is the best way to mitigate this threat?
You have a user in a corporate office who cannot seem to connect to any network drives. No one else has this problem. What is the most likely cause?
You have a user in a corporate office who cannot seem to connect to any network drives. No one else has this problem. What is the most likely cause?
ou are setting up a server for a small company. The company has a policy that says static IP addresses cannot be used, but at the same time they want to maintain the same IP address for that server. What can you do to satisfy both requirements?
ou are setting up a server for a small company. The company has a policy that says static IP addresses cannot be used, but at the same time they want to maintain the same IP address for that server. What can you do to satisfy both requirements?
You have a Windows workstation that frequently experiences malware symptoms. You have tried to roll back the System State several times but the malware persists. What can you do to resolve the issue?
You have a Windows workstation that frequently experiences malware symptoms. You have tried to roll back the System State several times but the malware persists. What can you do to resolve the issue?
The user tells you that an antivirus software is giving them a message that their computer is infected with a virus. They think this occurred while they were browsing the Internet. You take a look, and do not recognize the interface that the antivirus tool presents. What should you do next?
The user tells you that an antivirus software is giving them a message that their computer is infected with a virus. They think this occurred while they were browsing the Internet. You take a look, and do not recognize the interface that the antivirus tool presents. What should you do next?
A user clicked a link for a free gift card and now their computer is acting strange. What do you tell them to do first?
A user clicked a link for a free gift card and now their computer is acting strange. What do you tell them to do first?
A company workstation displayed a popup claiming that the computer has been infected with 168 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. Apparently the problem only happens when the user opens a web browser. Which steps are most likely to resolve the issue? (Choose two.)
A company workstation displayed a popup claiming that the computer has been infected with 168 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. Apparently the problem only happens when the user opens a web browser. Which steps are most likely to resolve the issue? (Choose two.)
You are trying to secure a company phone. You want to make sure that company data is secure in case the phone is stolen or lost. Which of the following would best suit your needs?
You are trying to secure a company phone. You want to make sure that company data is secure in case the phone is stolen or lost. Which of the following would best suit your needs?
An Android user reports that when they try to open the company’s proprietary mobile app, it immediately closes. They still have the problem even after rebooting the phone. The app contains critical information that cannot be lost. What should you try first to resolve the problem?
An Android user reports that when they try to open the company’s proprietary mobile app, it immediately closes. They still have the problem even after rebooting the phone. The app contains critical information that cannot be lost. What should you try first to resolve the problem?
The help desk is having a difficult time managing the volume of requests. What is the best solution for addressing this problem?
The help desk is having a difficult time managing the volume of requests. What is the best solution for addressing this problem?
You have a situation in which security software was accidentally uninstalled from all servers in your data center. You have found out that you will need to fill out a change request to have the same version software be reinstalled. Why would you want to follow the change management process in this scenario?
You have a situation in which security software was accidentally uninstalled from all servers in your data center. You have found out that you will need to fill out a change request to have the same version software be reinstalled. Why would you want to follow the change management process in this scenario?
a user had a license for an application that is in use on a personal home laptop. THe user approaches a system admin about using the same license on multiple comouters on the coporate network which of following is best desribes what the systems admin should tell the user?
a user had a license for an application that is in use on a personal home laptop. THe user approaches a system admin about using the same license on multiple comouters on the coporate network which of following is best desribes what the systems admin should tell the user?
a technician is upgrading the backup system for documents at high volume law firm. The current back up system can retain no more than 3 versions of full back ups before failing. The law firm is not concerned about restore times but asks the technician to retain more verions when possible =. which of following backup methods should technician Most likely implement.
a technician is upgrading the backup system for documents at high volume law firm. The current back up system can retain no more than 3 versions of full back ups before failing. The law firm is not concerned about restore times but asks the technician to retain more verions when possible =. which of following backup methods should technician Most likely implement.
a company is retiring old workstations and needs a ceritificate of desruction for all hard drives which of following would be best to perform on the Hard drives to ensure the data is unrecoverable. Select two
a company is retiring old workstations and needs a ceritificate of desruction for all hard drives which of following would be best to perform on the Hard drives to ensure the data is unrecoverable. Select two
Flashcards
Capital of France (example flashcard)
Capital of France (example flashcard)
Paris