which of the following policies?
An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social
security number. The end user should immediately contact the IT department and report a violation of which of
the following policies?
Which of the following configurations will allow the us…
A user is configuring the email settings on a smartphone. Which of the following configurations will allow the
user to synchronize email from multiple devices?
Which of the following commands should be run on the wo…
A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the
following commands should be run on the workstation?
Which of the following is the BEST option to prevent da…
Which of the following is the BEST option to prevent data breaches on lost mobile devices?
Which of the following BEST describes this type of attack?
Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username
and password to prevent her email box from being deleted immediately. Which of the following BEST describes
this type of attack?
Which of the following is the MOST likely cause of this…
A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it
can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of
this issue?
which of the following is the technician’s NEXT step?
A user calls the help desk because a folder containing critical business files is missing from the local drive. The
user is adamant that the folder was there the previous day, and cannot understand why it is gone. The
technician views the properties of the parent folder and sees a back up listed on the “Prior Versions” tab.
According to the theory of troubleshooting, which of the following is the technician’s NEXT step?
Prior to establishing a Remote Desktop Assistance conne…
A customer is experiencing issues with email and calls the help desk. The technician determines it would help
clarify the issue if the customer agrees to share their desktop. Prior to establishing a Remote Desktop
Assistance connection with a customer, a technician should ask the customer to:
Which of the following would be the next BEST step for …
A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident
response technician responds and verifies the user has indeed been violating company policy. Which of the
following would be the next BEST step for this technician to perform?
Which of the following is the NEXT step in the process …
A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to
the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process
of performing the repair?