A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).
A technician is creating an MDM policy using hardening techniques that are unique to each user. Which of the following techniques is the technician using?
A user hears an unexpected noise coming from their desktop computer. To troubleshoot the issue, a technician needs to open the case. Which of the following actions should the technician take next?
Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between windows also takes a long time. Which of the following diagnostic steps should a mobile technician take first?
A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user ' s session. Which of the following remote access technologies would support the use case?
Which of the following file types is best for performing automated tasks on startup on a Windows computer?
Which of the following is used to apply corporate restrictions on an Apple device?
A systems administrator logs in to a developer ' s machine to update the system and notices a performance issue. To troubleshoot the issue, the administrator attempts to open Task Manager multiple times, but it does not open. Which of the following is most likely the cause of this issue?
An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide?
Which of the following methods involves requesting a user ' s approval via a push notification to verify the user ' s identity?