Question.36 A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting? (A) Install alternate open-source software in place of the applications with issues. (B) Run both CPU and memory tests to ensure that all hardware functionality is normal. (C) Check for any installed patches and roll them back one at a time until the issue is resolved. (D) Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications. |
36. Click here to View Answer
Answer : C
Question.37 Which of the following could be used to implement secure physical access to a data center? (A) Geofence (B) Alarm system (C) Badge reader (D) Motion sensor |
37. Click here to View Answer
Answer : C
Question.38 The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bank’s risk? (Choose two.) (A) Enable multifactor authentication for each support account. (B) Limit remote access to destinations inside the corporate network. (C) Block all support accounts from logging in from foreign countries. (D) Configure a replacement remote-access tool for support cases. (E) Purchase a password manager for remote-access tool users. (F) Enforce account lockouts after five bad password attempts. |
38. Click here to View Answer
Answer : AF
Question.39 A user reports a computer is running slow. Which of the following tools will help a technician identify the issue? A. Disk Cleanup B. Group Policy Editor C. Disk Management D. Resource Monitor |
39. Click here to View Answer
Answer : D
Question.40 Upon downloading a new ISO, an administrator is presented with the following string: 59d15a16ce90c8ee97fa7c211b7673a8 Which of the following BEST describes the purpose of this string? (A) XSS verification (B) AES-256 verification (C) Hash verification (D) Digital signature verification |
40. Click here to View Answer
Answer : C