Which of the following should be done NEXT to continue …
A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and
the technician finds that two rogue processes cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem?
Which of the following is the MOST likely cause of this…
Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message that updates are being installed. Which of the following
is the MOST likely cause of this issue?
Which of the following is the MOST likely cause of this…
An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which
of the following is the MOST likely cause of this issue?
Which of the following ports should be allowed?
A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be
allowed?
Which of the following is the BEST solution for securin…
A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time
in the evening. Which of the following is the BEST solution for securing the workstation?
Which of the following is the MOST likely reason the fi…
A user wants to save a file into another user’s directory, but the file save is denied. Which of the following is the MOST likely reason the file save cannot be
completed?
which of the following forms of physical security?
A turnstile is an example of which of the following forms of physical security?
Which of the following Windows features would be used t…
Which of the following Windows features would be used to encrypt a single file or folder?
Which of the following prevention methods is considered…
Which of the following prevention methods is considered to be digital security?
Which of the following steps should the technician take…
A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? (Select
TWO).