You want to view detailed information about startup programs on Windows 10 computer and manage startup behavior. Which tool should you use?
System configuration
What action should the network administrator take to improve the wireless networks performance if the network is experiencing interference from neighboring networks?
Changing channels
Which safety tools would technicians use to prevent damage to sensitive components from electrostatic discharge while repairing a computer?
ESD straps and antistatic bags
What could be a potential action if of a user is experiencing slow response times when using various applications on their mobile device?
Clear the application cache
Which command-line tool would you use for package mgnt in a Debian-based Linux?
apt-get install
You want to view detailed information about the current Group policy settings applied to Windows 10. Which Command line tool should you use to get this info?
gpresult
What disposal method should a small business use to ensure that sensitive data stored on the hard drives of old desktop computers is completely erased?
Standard formatting
What should be included in a change request form when implementing change management best practices especially to minimize the disruptions to operations?
Date and time of the change
What troubleshooting step should be taken first to address a user being unable to access the network on their personal computer?
Check network cable connections
Which command-line tool would you use to change permissions of a file or directory in linux?
chmod
To deploy a Windows 10 image with pre-configured settings, applications and drivers across multiple computers in an organization you would what installation method?
Image deployment
What action would a company take to implement account management best practices to enhance security for new workstations?
Restrict log in times
Which combination of controls should be implemented to maintain optimal conditions for a server room?
Proper ventilation, surge suppressor, and temp/humidity monitoring
What could be a potential concern is a user notices that their mobile device is displaying fake security warnings and experiencing unexpected application behavior?
Application spoofing
Which command-line tool would you use to search for a specific keyword within the contents of multiple files on linux desktop?
grep
Which installation method would be most suitable for upgrading the computers from Windows 7 to Windows 10 while preserving user data and applications?
Upgrade installation
Which type of malware is specifically designed to hide it's presence and maintain privileged access to a computer system evidenced by system crashes and unexpected reboots?
Rootkit
Which remote access method should the IT administrator use to securely manage Linux servers?
SSH
Once the malware is isolated on a computer, what step should be taken to prepare the system for removal?
Disable System Restore in Windows
Which built-in macOS feature allows users to terminate unresponsive applications?
Force Quit or Command+Option+Esc
In a Windows 10 desktop that accepts wired and wireless connections. Which networking feature should you configure to prioritize the wired connection over wireless?
Establish network connections
What step should the user take to ensure a secure browser installation when using untrusted sources?
Verify the browser's hash value
Which script file type should the developer use for manipulating and displaying data within a web browser that would interact with HTML elements and handle user input dynamically?
.js JavaScript
What troubleshooting step should the user take if a user's Windows computer is unable to boot properly, displaying an error indicating no OS found?
Verify hardware connections
Which step is typically involved in installing an application from a .dmg file on macOS?
Mounting the .dmg file and launching from the mounted volume