When would the PXE option be used when repairing a PC?
When would the PXE option be used when repairing a PC? The display cannot be seen clearly. There is no response from the mouse or keyboard. The computer needs a…
When would the PXE option be used when repairing a PC? The display cannot be seen clearly. There is no response from the mouse or keyboard. The computer needs a…
A user has been using a smartphone for several hours, but now the applications on the device have become unresponsive. What action should the user take? Reconfigure settings. Restore the…
A computer technician is notified by a user that there are no automated backups being created on an Apple computer. What is the first thing the technician should check? correct…
Refer to the exhibit. A technician has been asked to install a video card. Which section of the motherboard will the technician use to install the card? section A section…
A corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately? VPN…
A business traveler connects to a wireless network with open authentication. What should the traveler do to secure confidential data when connecting to the business services? Connect with a VPN.…
Why would an administrator use Windows Remote Desktop and Windows Remote Assistant? to provide secure remote access to resources on another network to connect to an enterprise network across an…
Which disk management tool scans the critical files of an operating system and replaces the corrupt files? Scandisk Chkdsk Disk Cleanup Optimize Drives System File Checker Explanation & Hint: System…
A technician needs to permanently destroy data on some drives before disposing of them. What is the best way to do this? Partition the hard drives. Perform a full format.…
A technician is troubleshooting a workstation in a domain that has been infected with a virus. What is the first step the technician should take to clean the infected workstation?…
Which statement is correct about installing a 32-bit operating system on a x64 architecture? The OS will always make use of all the RAM available. The OS will run correctly.…
Which security threat hides the resources that it uses from antivirus programs? worm Trojan rootkit spyware Explanation & Hint: Rootkits target a known vulnerability to gain administrator-level access. This gives…
A user is able to only access files required to perform a specific task. What type of security practice is being applied? principle of privileges principle of necessary privilege principle…
A business organization is configuring security on the mobile devices that are used in the organization. The security policy states that business data on mobile devices should only ever be…
What is true about restore points? Once System Restore is used to restore a system, the change is irreversible. Restore points back up personal data files. Restore points recover corrupted…
A user has detected that one of the virtual machines in a computer is infected with a virus. Which statement about the situation is likely to be true? The host…
Which user account should be used only to perform system management and not as the account for regular use? guest standard user administrator power user Explanation & Hint: The administrator…
What type of file system allows the use of files larger than 5 GB and is mostly used on internal hard drives? FAT32 FAT64 NTFS CDFS exFAT Explanation & Hint:…
A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take? Disable SSID broadcast. Enable…
What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point? MAC filtering software firewall proxy server WPA encryption…