A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?
Educate the end user
Which of the following protects a mobile device against unwanted access when it is left unattended?
PIN code
A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements?
Soft token
Which of the following best describes when to use the YUM command in Linux?
To add functionality
A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?
RDP
A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company’s risk to avoid any issues. Which of the following items should the technician implement?
Anti-phishing training
A systems administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. Which of the following should the administrator do to resolve this issue?
Roll back the updates
A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?
Verifying warranty status with the vendor
Which of the following would MOST likely be used to extend the life of a device?
Proper ventilation
An engineer is conguring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?
Remote network installation
A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?
Personalization
A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use for wide-scale deployment?
PXE boot
A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user most likely be able to make this change?
System
While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?
Recovery key
A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Choose two.)
Zombies, Botnet
A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Choose two.)
Windows Backup and Restore, Windows Defender
A Windows user recently replaced a computer. The user can access the public internet on the computer; however, an internal site at https://companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?
Firewall settings
A systems administrator is conguring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?
Group Policy
Which of the following allows access to the command line in macOS?
Terminal
A desktop technician has received reports that a user's PC is slow to load programs and saved files. The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first?
Disk Defragment
A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?
Resource Monitor
Which of the following refers to the steps to be taken if an issue occurs during a change implementation?
Rollback
A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?
Disk Management
A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?
Quarantine the computer
An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following should the technician perform to fix the issue?
Roll back updates