A technician, who is working at a local office, has found multiple copies of home edition software installed on computers. Which of the following does this MOST likely violate?
EULA
Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility of USB ash drives across several generations of Microsoft operating systems?
FAT32
Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrficing security?
WPA3
A technician is investigating options to secure a small office wireless network. One requirement is to allow automatic logins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?
RADIUS
A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?
GPT
A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?
Examine the localhost file entries.
Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?
An employee's Apple ID used on the device
Which of the following threats will the use of a privacy screen on a computer help prevent?
Shoulder surfing
A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?
Adjust the content filtering
A developer receives the following error while trying to install virtualization software on a workstation: VTx not supported by system - Which of the following upgrades will MOST likely fix the issue?
Processor
Which of the following features must be configured on a Windows OS desktop in order to encrypt files in a laptop?
BitLocker
Which of the following is the default GUI and file manager in macOS?
Finder
A technician needs to override DNS and redirect IP addresses and URLs to different locations. Which of the following should the technician do?
Edit the hosts file
A technician needs a way to test software without placing company systems at risk. Which of the following features should the technician use to completely achieve this objective?
Sandbox
The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do NEXT to troubleshoot the issue?
Calibrate the phone sensors
A manager called the help desk to ask for assistance with creating a more secure environment for the finance department, which resides in a nondomain environment. Which of the following would be the BEST method to protect against unauthorized use?
Restricting user permissions
A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?
Battery backup
A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?
Virtual private network
A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server is consistently communicating with an IP address that is traced back to a company that awards digital currency for salving hash algorithms. Which of the following was MOST likely used to compromise the server?
Cryptomining malware
A technician received a call from a user who clicked on a web advertisement. Now, every time the user moves the mouse, a pop-up displays across the monitor. Which of the following procedures should the technician perform?
Perform a malware scan
A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?
The malware was installed before the system restore point was created
A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?
Malware
Which of the following operating systems can allow users to have access to the source code, can host various server applications, and can be command line only?
Linux
A system drives nearly full, and a technician needs to free up some space. Which of the following tools should the technician use?
Disk Cleanup
A user’s permissions are limited to read on a shared network folder using NTFS security settings. Which of the following describes this type of security control?
ACL