Which of the following is protected by government policy for end-user information?
An organization's critical database files were attacked with ransomware. The company refuses to pay the ransom for a decryption key. All traces of the infection have been removed from the underlying servers. Which of the following should the company do next?
A computer is restarting automatically and displaying the following error message: "Your PC ran into a problem and needs to restart. We're just collecting some error info, and then we'll restart for you. (0% complete)." Which of the following should the technician do first to diagnose the issue?
Which of the following is used to detect and record access to restricted areas?
A company needs to securely and remotely access network devices. Which of the following will allow the company to access these devices?
h company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?
Internet speeds on a user's Windows 10 device are slow, but other devices on the same network are running at normal speeds. A technician thinks the issue may be related to the proxy settings. Which of the following should the technician check to verify the proxy configuration?
Which of the following applications allows a user to create backups in macOS?
After a computer upgrade at an imaging lab. the upgraded computers are not able to obtain an IP address. Which of the following is most likely the issue?
After access to a server room was breached, a technician needs to implement a secure method to prevent unauthorized access. Which of the following is the most secure solution?
Which of the following ensures data is unrecoverable on a lost or stolen mobile device?
A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?
When a user is browsing a website on a smartphone, a pop-up appears. The pop-up states that the system has been breached and directs the user to an application to resolve the breach. Which of the following should the user do?
A user downloads an application with a plug-in that is designed to automatically prompt for an OTP when the user browses to a specific website. The plug-in installs without any warnings or errors. The first time the user goes to the site, the prompt does not open, and the user cannot access the site. Which of the following browser settings should the user configure?
Which of the following should be documented to ensure that the change management plan is followed?
An MDM report shows that a user's company cell phone has unauthorized applications installed. The device has recently checked into the MDM server, and the company still has access to remotely wipe the device. Which of the following describes the action the user has performed?
A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?
A technician needs to reimage a desktop in an area without network access. Which of the following should the technician use? (Select two).
A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?
A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?