A user's iPhone was permanently locked after several tailed login attempts. Which of the following will restore access to the device?
A customer is accessing a public kiosk in a company's lobby. Which of the following should be enforced to mitigate the risk of customer data being accidentally saved to the kiosk?
Which of the following best describes when to use the YUM command in Linux?
Which of the following Is used to identify potential issues with a proposed change poor lo implementation?
A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?
A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?
A user's permissions are limited to read on a shared network folder using NTFS security settings. Which of the following describes this type of security control?
A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).
An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?
A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?
Which of the following protects a mobile device against unwanted access when it is left unattended?
Which of the following is an advantage of using WPA2 instead of WPA3?
A salesperson's computer is unable to print any orders on a local printer that is connected to the computer Which of the following tools should the salesperson use to restart the print spooler?
A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic Which of the following types of infections are the workstations most likely experiencing? (Select two)
Which of the following macOS utilities uses AES-128 to encrypt the startup disk?