A Mac user needs to configure a network device using a serial connection to enable a remote network connection. Which utility would MOST likely be used to make the necessary changes?
What is Terminal
A user has changed the MAC address of a laptop to gain access to a network. This is an instance of?
What is spoofing.
A technician needs to format a 64GB flash drive. Which of the following formats will the technician MOST likely use?
What is FAT32.
Joe, a customer, requests to have a technician rename his laptop to the name of his favorite sports team. What document MUST the technician consider before performing this action?
What is inventory management.
Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger. What would be the BEST resolution to Anns issue?
What is disconnect and then reconnect the stylus.
A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which terminal command should the technician use?
What is iwconfig.
A technician has enabled port security on a switchport. Which of the following BEST describes the effect this will have?
What is devices must match a list of allowed MAC addresses before accessing the network.
Which of the following would BEST support an 8TB hard drive with one partition?
What is GPT.
Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when trying to operate it. What should Joe check NEXT to troubleshoot the issue?
What is the Device Manager.
Ann, a technician, is dispatched to a corporate customer that has reported a malware infection. Upon arrival, Ann notices the system is shut off, and she is able to start the computer without incident. Ann also notices numerous pop-ups appear when the web browser is opened. What should Ann do NEXT?
What is report the incident to the appropriate contact.
A technician is running Windows on a company's Mac workstations without incurring an additional expense to the company. The Windows licenses were purchased in the past. Users are required to run both Windows and Mac operating systems on their machines, but never at the same time. What would best accomplish this?
What is install virtualization software.
What is the best way to accomplish whitelisting safe devices?
What is MAC filtering.
A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. What is the reason the technician is experiencing this issue?
What is EFS Security
Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. What would explain why Joe cannot access his personal shares?
What is a firewall exception must be set.
Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she opens a browser, she gets a message indicating the page cannot be displayed. She notices there is a "?" in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. What is the MOST likely issue Ann is experiencing?
What is there is unauthenticated wireless connectivity.
A technician is restoring files, which were deleted more than one month ago, from a backup on Mac OS X. Using the available GUI utility, which of the utility should the technician launch to accomplish this task?
What is Finder.
A small business has an open Wi-Fi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Choose two.)
What is MAC filtering and signal strength.
A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which filesystem types would the customers drive require?
What is ext4.
Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key. What is MOST likely the cause?
What is ransomware.
An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for subscribing to an organization's mailing list. What should be performed to remove and prevent any further emails from this organization?
What is create domain-based filters.
A Mac user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. What is the built-in utility that should be used?
What is Time Machine.
A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?
What is Asset ID and MAC address.
A technician is installing the Mac OS X operating system. The technician is prompted to select the filesystem. Which filesystems should the technician utilize to install the listed operating system?
What is HFS.
Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which Control Panel utility can Joe use to help with this situation?
What is credential manager.
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. What setting or feature is responsible for the problems Ann is experiencing?
What is multifactor authentication.