A user has detected that one of the virtual machines in a computer is infected with a virus. Which statement about the situation is likely to be true?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A user has detected that one of the virtual machines in a computer is infected with a virus. Which statement about the situation is likely to be true? The host…

Continue ReadingA user has detected that one of the virtual machines in a computer is infected with a virus. Which statement about the situation is likely to be true?

Which user account should be used only to perform system management and not as the account for regular use?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which user account should be used only to perform system management and not as the account for regular use? guest standard user administrator power user Explanation & Hint: The administrator…

Continue ReadingWhich user account should be used only to perform system management and not as the account for regular use?

What type of file system allows the use of files larger than 5 GB and is mostly used on internal hard drives?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What type of file system allows the use of files larger than 5 GB and is mostly used on internal hard drives? FAT32 FAT64 NTFS CDFS exFAT Explanation & Hint:…

Continue ReadingWhat type of file system allows the use of files larger than 5 GB and is mostly used on internal hard drives?

A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take? Disable SSID broadcast. Enable…

Continue ReadingA user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?

What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point? MAC filtering software firewall proxy server WPA encryption…

Continue ReadingWhat is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

What is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network? a security encryption key a MAC address a username and password an updated…

Continue ReadingWhat is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?

What is the first step a technician should take when preparing to work on the inside of a computer?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is the first step a technician should take when preparing to work on the inside of a computer? Remove the power supply. Disconnect the computer from power. Disconnect the…

Continue ReadingWhat is the first step a technician should take when preparing to work on the inside of a computer?

A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician…

Continue ReadingA technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?

Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue? Is your security software up to date? Have you scanned…

Continue ReadingWhich question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?

A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to…

Continue ReadingA technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

A computer can successfully ping outside the local network, but cannot access any World Wide Web services. What is the most probable cause of this problem?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A computer can successfully ping outside the local network, but cannot access any World Wide Web services. What is the most probable cause of this problem? Windows Firewall is blocking…

Continue ReadingA computer can successfully ping outside the local network, but cannot access any World Wide Web services. What is the most probable cause of this problem?

A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop…

Continue ReadingA third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)

A user purchases a new smartphone and is trying to use a high quality Bluetooth headset on the new device. However, the headset is not connected to the smartphone. What are three settings that the user needs to check to troubleshoot the problem? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A user purchases a new smartphone and is trying to use a high quality Bluetooth headset on the new device. However, the headset is not connected to the smartphone. What…

Continue ReadingA user purchases a new smartphone and is trying to use a high quality Bluetooth headset on the new device. However, the headset is not connected to the smartphone. What are three settings that the user needs to check to troubleshoot the problem? (Choose three.)

A user is hiking in a city park. The user wants to make a call home but cannot get a reliable cellular signal. What are two possible causes for the bad cellular coverage? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A user is hiking in a city park. The user wants to make a call home but cannot get a reliable cellular signal. What are two possible causes for the…

Continue ReadingA user is hiking in a city park. The user wants to make a call home but cannot get a reliable cellular signal. What are two possible causes for the bad cellular coverage? (Choose two.)

A store in a shopping center uses a wireless network to provide internet access for three tablet computers. The authentication to the wireless router has been configured as 128-bit WEP. Recently the store employees notice that the internet connection is getting slower. The network administrator of the shopping center reviews the logs of the wireless router and notices many non-store devices are associated with the router. Which two actions can the network administrator do to improve the security of the wireless network access? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A store in a shopping center uses a wireless network to provide internet access for three tablet computers. The authentication to the wireless router has been configured as 128-bit WEP.…

Continue ReadingA store in a shopping center uses a wireless network to provide internet access for three tablet computers. The authentication to the wireless router has been configured as 128-bit WEP. Recently the store employees notice that the internet connection is getting slower. The network administrator of the shopping center reviews the logs of the wireless router and notices many non-store devices are associated with the router. Which two actions can the network administrator do to improve the security of the wireless network access? (Choose two.)

An administrative assistant tries to link a Bluetooth keyboard and mouse to a computer. The keyboard does not work, but the mouse works fine. What are two issues that could cause this situation? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

An administrative assistant tries to link a Bluetooth keyboard and mouse to a computer. The keyboard does not work, but the mouse works fine. What are two issues that could…

Continue ReadingAn administrative assistant tries to link a Bluetooth keyboard and mouse to a computer. The keyboard does not work, but the mouse works fine. What are two issues that could cause this situation? (Choose two.)

A technician working on a computer discovers what is suspected to be illegal activity. Which three pieces of information should be immediately documented? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A technician working on a computer discovers what is suspected to be illegal activity. Which three pieces of information should be immediately documented? (Choose three.) duration of the suspected illegal…

Continue ReadingA technician working on a computer discovers what is suspected to be illegal activity. Which three pieces of information should be immediately documented? (Choose three.)

A support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.) Ask socially related questions to direct…

Continue ReadingA support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)

Which two guidelines are appropriate for creating strong passwords? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two guidelines are appropriate for creating strong passwords? (Choose two.) Use at least eight characters. Include letters, numbers, and symbols. Change the password once each year. Use only upper…

Continue ReadingWhich two guidelines are appropriate for creating strong passwords? (Choose two.)

Which two precautions can help prevent social engineering? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two precautions can help prevent social engineering? (Choose two.) Always ask for the ID of unknown persons. Escort all visitors. Keep your password securely under your keyboard. Do not…

Continue ReadingWhich two precautions can help prevent social engineering? (Choose two.)