Join the discussion
Question 1/313
A remote user is experiencing issues with Outlook settings and asks a technician to review the settings. Which of the following can the technician use to access the user's computer remotely?
Correct Answer: C
One of the possible ways to access the user's computer remotely is to use RDP, which stands for Remote Desktop Protocol. RDP is a protocol that allows a user to connect to another computer over a network and use its graphical interface. RDP is commonly used for remote desktop software, such as Microsoft Remote Desktop Connection1. To use RDP, the user's computer must run RDP server software, and the technician must run RDP client software. The technician can then enter the user's IP address or hostname, and provide the appropriate credentials to log in to the user's computer. Once connected, the technician can view and control the user's desktop, and review the Outlook settings.
Add Comments
- Other Question (313q)
- Q1. A remote user is experiencing issues with Outlook settings and asks a technician to review...
- Q2. A technician is preparing to remediate a Trojan virus that was found on a workstation. Whi...
- Q3. When a user is in the office, web pages are loading slowly on the user's phone. Which of t...
- Q4. A technician is trying to encrypt a single folder on a PC. Which of the following should t...
- Q5. Which of the following defines the extent of a change?...
- Q6. The findings from a security audit indicate the risk of data loss from lost or stolen lapt...
- Q7. A technician needs to exclude an application folder from being cataloged by a Windows 10 s...
- Q8. A network technician installed a SOHO router for a home office user. The user has read rep...
- Q9. A technician needs to track evidence for a forensic investigation on a Windows computer. W...
- Q10. A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lo...
- Q11. Malware is installed on a device after a user clicks on a link in a suspicious email. Whic...
- Q12. Windows updates need to be performed on a department's servers. Which of the following met...
- Q13. A technician wants to update the local security policies on a Windows machine but is unabl...
- Q14. A technician is troubleshooting a computer with a suspected short in the power supply. Whi...
- Q15. A user is unable to access files on a work PC after opening a text document. The text docu...
- Q16. Which of the following should be done NEXT?
- Q17. A user reports that the pages flash on the screen two or three times before finally stayin...
- Q18. A client recently upgraded their Windows 10 machine to Windows 11. The client reports the ...
- Q19. Applications on a computer are not updating, which is preventing the user from opening cer...
- Q20. An organization is creating guidelines for the incorporation of generative Al solutions. I...
- Q21. A technician found that an employee is mining cryptocurrency on a work desktop. The compan...
- Q22. A user reports that a workstation is operating sluggishly Several other users operate on t...
- Q23. A user calls the help desk to report that none of the files on a PC will open. The user al...
- Q24. Internet speeds on a user's Windows 10 device are slow, but other devices on the same netw...
- Q25. A call center technician receives a call from a user asking how to update Windows Which of...
- Q26. A technician installed a known-good, compatible motherboard on a new laptop. However, the ...
- Q27. After a user upgraded the Windows operating system to the latest feature release, the user...
- Q28. A company wants to remove information from past users' hard drives in order to reuse the h...
- Q29. Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the t...
- Q30. A company is recycling old hard drives and wants to quickly reprovision the drives for reu...
- Q31. A Windows computer is experiencing slow performance when the user tries to open programs a...
- Q32. Which of the following script types is used with the Python language by default?...
- Q33. Which of the following is an example of MFA?
- Q34. A technician needs to reimage a desktop in an area without network access. Which of the fo...
- Q35. Which of the following is command options is used to display hidden files and directories?...
- Q36. A technician has verified that a user's computer has a virus and the antivirus software is...
- Q37. A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone s...
- Q38. A user receives an error message from an online banking site that states the following: Yo...
- Q39. A user is attempting to make a purchase at a store using a phone. The user places the phon...
- Q40. A technician wants to improve password security after several users admitted to using very...
- Q41. Which of the following Windows 10 editions is the most cost-effective and appropriate for ...
- Q42. Which of the following environments allows for the testing of critical systems without the...
- Q43. A company is experiencing a ODDS attack. Several internal workstations are the source of t...
- Q44. A user receives a message on a PC stating it has been infected by malware. A technician ru...
- Q45. Users are reporting that an unsecured network is broadcasting with the same name as the no...
- Q46. Which of the following environmental controls is most important to maintain the safety of ...
- Q47. A technician is helping a customer connect to a shared drive. The technician notices some ...
- Q48. A user in a SOHO asks an off-site, remote technician to connect securely to the user's lap...
- Q49. After a security event, a technician removes malware from an affected laptop and disconnec...
- Q50. A user is unable to log in to the domain with a desktop PC, but a laptop PC is working pro...
- Q51. A Windows user reported that a pop-up indicated a security issue. During inspection, an an...
- Q52. A developer is creating a shell script to automate basic tasks in Linux. Which of the foll...
- Q53. Which of the following is the best reason for sandbox testing in change management? * To e...
- Q54. After clicking on a link in an email a Chief Financial Officer (CFO) received the followin...
- Q55. Which of the following should be considered when maintaining the environment of a server r...
- Q56. A user contacts the help desk to request assistance with a program feature. The user is in...
- Q57. A remote user contacts the help desk about an email that appears to be distorted. The tech...
- Q58. A user's corporate laptop with proprietary work Information was stolen from a coffee shop....
- Q59. A technician needs to configure a newly installed SSD. Which of the following tools should...
- Q60. A systems administrator is monitoring an unusual amount of network traffic from a kiosk ma...
- Q61. A user is setting up a new Windows 10 laptop. Which of the following Windows settings shou...
- Q62. A manager called the help desk to ask for assistance with creating a more secure environme...
- Q63. A company wants to reduce the negative ecological impacts of its business and has decided ...
- Q64. Which of the following provides disk encryption on computers running a Windows OS?...
- Q65. Which of the following best describes when to use the YUM command in Linux?...
- Q66. Which of the following is the most significant drawback of using the WEP protocol for wire...
- Q67. Which of the following should be used to control security settings on an Android phone in ...
- Q68. The network was breached over the weekend System logs indicate that a single user's accoun...
- Q69. A technician receives a call from a user who is on vacation. The user provides the necessa...
- Q70. Multiple users routinely record log-in information in readily accessible areas. Which of t...
- Q71. A technician wants to securely dispose of storage drives. Which of the following is the be...
- Q72. A technician is creating a Windows splash screen that details login expectations. Which of...
- Q73. Which of the following often uses an SMS or third-party application as a secondary method ...
- Q74. A business lost all data and equipment after a disaster. Due to the disaster, the business...
- Q75. The camera and microphone on an iPhone user's device are activating without any user input...
- Q76. A bank would like to enhance building security in order to prevent vehicles from driving i...
- Q77. Which of the following commands should be used to display current processor activity on a ...
- Q78. A technician is troubleshooting a user's PC that is running slowly and displaying frequent...
- Q79. A user enabled a mobile device's screen lock function with pattern unlock. The user is con...
- Q80. A technician needs to establish a remote access session with a user who has a Windows work...
- Q81. A large organization is researching proprietary software with vendor support for a multius...
- Q82. A technician downloaded an OS installation file but is unable to run it. When the technici...
- Q83. A mobile phone user has downloaded a new payment application that allows payments to be ma...
- Q84. A user's Windows desktop has low disk space. A technician thinks some upgrade files were n...
- Q85. A user is setting up backups on a workstation. The user wants to ensure that the restore p...
- Q86. A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to ...
- Q87. A technician is setting up a new PC in a SOHO. Which of the following should the technicia...
- Q88. A technician is configuring a SOHO device Company policy dictates that static IP addresses...
- Q89. A user opened an infected email. A security administrator responded to the malicious event...
- Q90. As a corporate technician, you are asked to evaluate several suspect email messages on a c...
- Q91. A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employ...
- Q92. A technician is partitioning a hard disk. The five primary partitions should contain 4TB o...
- Q93. Which of the following must be maintained throughout the forensic evidence life cycle when...
- Q94. A company has experienced a ransomware attack. Which of the following is the best way to r...
- Q95. A workstation is displaying a message indicating that a user must exchange cryptocurrency ...
- Q96. Which of the following is protected by government policy for end-user information?...
- Q97. A technician is creating a location on a Windows workstation for a customer to store meeti...
- Q98. A new employee is having difficulties using a laptop with a docking station The laptop is ...
- Q99. Which of the following applications allows a user to create backups in macOS?...
- Q100. A technician needs to disable guest log-ins on domain-joined desktop machines. Which of th...
- Q101. A customer needs to purchase a desktop capable of rendering video. Which of the following ...
- Q102. A new spam gateway was recently deployed at a small business However; users still occasion...
- Q103. Which of the following best describes XFS?
- Q104. A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro licens...
- Q105. A technician is on-site dealing with an angry customer. The customer thinks the issues hav...
- Q106. A network administrator is deploying a client certificate lo be used for Wi-Fi access for ...
- Q107. A web developer installs and launches a new external web server. Immediately following the...
- Q108. A technician is troubleshooting an issue that requires a user profile to be rebuilt. The t...
- Q109. A user has been unable to receive emails or browse the internet from a smartphone while tr...
- Q110. A technician is troubleshooting boot times for a user. The technician attempts to use MSCo...
- Q111. A technician receives an invalid certificate error when visiting a website. Other workstat...
- Q112. Which of the following operating systems would most likely be used to run the inventory ma...
- Q113. Which of the following is a data security standard for protecting credit cards?...
- Q114. A user installed a new application that automatically starts each time the user logs in to...
- Q115. A company's assets are scanned annually. Which of the following will most likely help the ...
- Q116. A technician is working on a way to register all employee badges and associated computer I...
- Q117. After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporat...
- Q118. A systems administrator at a small company wants to discretely access user machines and ve...
- Q119. A technician downloads a validated security tool and notes the vendor hash of a58e87a2. Wh...
- Q120. A company using Active Directory wants to change the location of all users' "Documents" to...
- Q121. A user takes a work-issued laptop home for the first time. When the user attempts to brows...
- Q122. A systems administrator is tasked with configuring desktop systems to use a new proxy serv...
- Q123. A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes th...
- Q124. A user installed a new computer game. Upon starting the game, the user notices the frame r...
- Q125. Which of the following is the most likely reason a filtration system is critical for data ...
- Q126. Which of the following involves sending arbitrary characters in a web page request?...
- Q127. The courts determined that a cybercrimes case could no longer be prosecuted due to the age...
- Q128. Which of the following protocols supports fast roaming between networks?...
- Q129. A user's iPhone was permanently locked after several tailed login attempts. Which of the f...
- Q130. Which of the following change management practices lists all the changes that are taking p...
- Q131. A company is experiencing a DDoS attack. Several internal workstations are the source of t...
- Q132. A user reports the following issues: *Their computer is constantly running slowly. *The de...
- Q133. A user's computer is running slower than usual and takes a long time to start up. Which of...
- Q134. A user is attempting to browse the internet using Internet Explorer. When trying to load a...
- Q135. Which of the following environmental effects can be the result of using virtualization?...
- Q136. A systems administrator finds that a Windows client machine with an address of 169.254.124...
- Q137. A user reports a computer is running slow. Which of the following tools will help a techni...
- Q138. A junior administrator is responsible for deploying software to a large group of computers...
- Q139. A company discovered that numerous computers from multiple geographic locations are sendin...
- Q140. A technician is setting up a new laptop for an employee who travels. Which of the followin...
- Q141. A customer is accessing a public kiosk in a company's lobby. Which of the following should...
- Q142. Employees at comptia.org are reporting getting an usual amount of emails from a coworker. ...
- Q143. Which of the following is MOST likely used to run .vbs files on Windows devices?...
- Q144. A technician is moving a Windows workstation from the accounting department to the sales d...
- Q145. Which of the following is used to generate passcodes necessary to access applications or s...
- Q146. After a company installed a new SOHO router customers were unable to access the company-ho...
- Q147. A PC is taking a long time to boot Which of the following operations would be best to do t...
- Q148. Following the latest Windows update PDF files are opening in Microsoft Edge instead of Ado...
- Q149. A technician received a call from a user who clicked on a web advertisement Now. every tim...
- Q150. A technician suspects a rootkit has been installed and needs to be removed. Which of the f...
- Q151. A management team at a small office wants to block access to inappropriate websites and cr...
- Q152. An Internet cafe has several computers available for public use. Recently, users have repo...
- Q153. A user reports seeing random, seemingly non-malicious advertisement notifications in the W...
- Q154. A macOS user needs to create another virtual desktop space. Which of the following applica...
- Q155. All the desktop icons on a user's newly issued PC are very large. The user reports that th...
- Q156. A technician is installing new software on a macOS computer. Which of the following file t...
- Q157. Which of the following is the MOST basic version of Windows that includes BitLocker?...
- Q158. A user is unable to start a computer following a failed Windows 10 update. When trying to ...
- Q159. An administrator received a new shipment of mobile devices. Per company policy, all enterp...
- Q160. The following error is displayed on a user's computer screen: No operating system found Wh...
- Q161. A wireless network is set up, but it is experiencing some interference from other nearby S...
- Q162. A technician is setting up a SOHO wireless router. The router is about ten years old. The ...
- Q163. A user is attempting to access a shared drive from a company-issued laptop while working f...
- Q164. A technician is building a new desktop machine for a user who will be using the workstatio...
- Q165. A Linux technician needs a filesystem type that meets the following requirements: . All ch...
- Q166. A user wants to set up speech recognition on a PC. In which of the following Windows Setti...
- Q167. Which of the following should be used to configure automatic backups on macOS?...
- Q168. A technician is configuring a SOHO router and wants to only allow specific computers on th...
- Q169. A technician requires graphical remote access to various Windows, Linux, and macOS desktop...
- Q170. A user reports that an air-gapped computer may have been infected with a virus after the u...
- Q171. A user's smartphone screen is not rotating. The technician confirms the rotation lock is d...
- Q172. A technician removed a virus from a user's device. The user returned the device a week lat...
- Q173. A technician is doing a bare-metal installation of the Windows 10 operating system. Which ...
- Q174. A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The la...
- Q175. A user reports that the hard drive activity light on a Windows 10 desktop computer has bee...
- Q176. A security administrator teaches all of an organization's staff members to use BitLocker T...
- Q177. Which of the following macOS features provides the user with a high-level view of all open...
- Q178. A company would like to implement multifactor authentication for all employees at a minima...
- Q179. An executive has contacted you through the help-desk chat support about an issue with a mo...
- Q180. A user's Windows computer seems to work well at the beginning of the day. However, its per...
- Q181. Which of the following is an advantage of using WPA2 instead of WPA3?...
- Q182. Which of the following file types allows a user to easily uninstall software from macOS by...
- Q183. A field technician applied a Group Policy setting to all the workstations in the network. ...
- Q184. A company wants a new software program installed on all company computers, including remot...
- Q185. A user requires a drive to be mapped through a Windows command line. Which of the followin...
- Q186. Which of the following is also known as something you know, something you have, and someth...
- Q187. A technician is investigating an employee's smartphone that has the following symptoms * T...
- Q188. A small-office customer needs three PCs to be configured in a network with no server. Whic...
- Q189. A company needs to securely dispose of data stored on optical discs. Which of the followin...
- Q190. A technician needs to configure security settings on a Windows 10 workstation. Which of th...
- Q191. A technician is troubleshooting a PC that has been performing poorly. Looking at the Task ...
- Q192. A help desk technician is troubleshooting a workstation in a SOHO environment that is runn...
- Q193. Which of the following file extensions are commonly used to install applications on a macO...
- Q194. A user downloads an application with a plug-in that is designed to automatically prompt fo...
- Q195. A technician is implementing the latest application security updates for endpoints on an e...
- Q196. A technician is reusing several hard drives to increase local storage on company workstati...
- Q197. A company-owned mobile device is displaying a high number of ads, receiving data-usage lim...
- Q198. In which of the following scenarios would remote wipe capabilities MOST likely be used? (S...
- Q199. A technician is troubleshooting a customer's PC and receives a phone call. The technician ...
- Q200. A police officer often leaves a workstation for several minutes at a time. Which of the fo...
- Q201. Which of the following features allows a technician to configure policies in a Windows 10 ...
- Q202. A systems administrator needs to reset a users password because the user forgot it. The sy...
- Q203. h company uses shared drives as part of a workforce collaboration process. To ensure the c...
- Q204. An organization is updating the monitors on kiosk machines. While performing the upgrade, ...
- Q205. A technician is deploying a new Wi-Fi solution for the office and wants to ensure users ca...
- Q206. A technician needs to interconnect two offices to the main branch while complying with goo...
- Q207. The battery life on an employee's new phone seems to be drastically less than expected, an...
- Q208. A help desk team lead contacts a systems administrator because the technicians are unable ...
- Q209. A customer reported that a home PC with Windows 10 installed in the default configuration ...
- Q210. An employee has been using the same password for multiple applications and websites for th...
- Q211. A user is having phone issues after installing a new application that claims to optimize p...
- Q212. While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that m...
- Q213. Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft ...
- Q214. A user lost a company tablet that was used for customer intake at a doctor's office. Which...
- Q215. A workstation's hard drive is making loud noises, applications are running slowly, and the...
- Q216. Each time a user tries to go to the selected web search provider, a different website open...
- Q217. Which of the following is the most secure screen lock?...
- Q218. A technician is updating the OS on a number of Windows workstations. After successfully up...
- Q219. An IT technician is attempting to access a user's workstation on the corporate network but...
- Q220. During a recent flight an executive unexpectedly received several dog and cat pictures whi...
- Q221. During a network outage, a technician discovers a new network switch that was not listed i...
- Q222. Users report having difficulty using the Windows Hello facial recognition feature. Which o...
- Q223. While assisting a customer with an issue, a support representative realizes the appointmen...
- Q224. A malicious user was able to export an entire website's user database by entering specific...
- Q225. A technician is installing software on a user's workstation. The installation fails due to...
- Q226. A technician is replacing the processor in a desktop computer prior to opening the compute...
- Q227. Which of the following commands can a technician use to get the MAC address of a Linux dis...
- Q228. While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. T...
- Q229. Which of the following helps ensure that a piece of evidence extracted from a PC is admiss...
- Q230. A technician finds that a new company security policy has broken an application in use at ...
- Q231. Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the t...
- Q232. A technician needs to recommend the best backup method that will mitigate ransomware attac...
- Q233. A branch office suspects a machine contains ransomware. Which of the following mitigation ...
- Q234. Which of the following will automatically map network drives based on Group Policy configu...
- Q235. Which of the following physical security controls can prevent laptops from being stolen?...
- Q236. A technician has been unable to remediate a persistent malware infection on a user's works...
- Q237. Which of the following Is used to identify potential issues with a proposed change poor lo...
- Q238. A technician is setting up a printer on a Linux workstation. Which of the following comman...
- Q239. A company downloads a large number of files over the internet daily. The company needs a w...
- Q240. Which of the following is the most likely to use NTFS as the native filesystem?...
- Q241. A neighbor successfully connected to a user's Wi-Fi network. Which of the following should...
- Q242. A user reports an issue when connecting a mobile device to Bluetooth. The user states the ...
- Q243. A technician is trying to connect to a user's laptop in order to securely install updates....
- Q244. A proxy server is required for internet access from a corporate network. Which of the foll...
- Q245. A technician is upgrading the backup system for documents at a high-volume law firm. The c...
- Q246. An employee has repeatedly contacted a technician about malware infecting a work computer....
- Q247. A technician successfully removed malicious software from an infected computer after runni...
- Q248. Which of the following operating systems were designed for smartphones? (Select two)....
- Q249. A technician needs to implement password requirements that apply to all domain-joined comp...
- Q250. A user recently purchased a second monitor and wants to extend the Windows desktop to the ...
- Q251. A technician is working on a Windows 10 PC that has unwanted applications starting on boot...
- Q252. A desktop engineer is deploying a master image. Which of the following should the desktop ...
- Q253. An employee lost a smartphone and reported the loss to the help desk. The employee is conc...
- Q254. A technician is configuring a specific NTP server for all company-issued laptops. These Wi...
- Q255. A technician is installing a new business application on a user's desktop computer. The ma...
- Q256. A system drive is nearly full, and a technician needs lo tree up some space. Which of the ...
- Q257. A Windows user wants a filesystem that protects confidential data from attackers who have ...
- Q258. A user needs to test several software replacement possibilities. Part of the process invol...
- Q259. A technician is unable to join a Windows 10 laptop to a domain Which of the following is t...
- Q260. A user reports that a PC seems to be running more slowly than usual. A technician checks s...
- Q261. Which of the following is used to detect and record access to restricted areas?...
- Q262. A user reported that Windows has crashed several times during the day. A technician needs ...
- Q263. A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following s...
- Q264. A technician is asked to resize a partition on the internal storage drive of a computer ru...
- Q265. An Android user reports that when attempting to open the company's proprietary mobile appl...
- Q266. A user is trying to limit the amount of time their children spend on the internet. Which o...
- Q267. A user's corporate phone was stolen, and the device contains company trade secrets. Which ...
- Q268. A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Alth...
- Q269. A technician is manually updating Windows workstations. Each workstation is currently runn...
- Q270. A technician receives a call (rom a user who is having issues with an application. To best...
- Q271. A technician receives a call from a user who is unable to open Outlook. The user states th...
- Q272. A technician is in the process of installing a new hard drive on a server but is called aw...
- Q273. An administrator needs to select a method to dispose of SSDs containing sensitive data. Wh...
- Q274. A BSOD appears on a user's workstation monitor. The user immediately presses the power but...
- Q275. A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the ...
- Q276. A user clicks a link in an email. A warning message in the user's browser states the site'...
- Q277. An application's performance is degrading over time. The application is slowing but never ...
- Q278. A Windows workstation that was recently updated with approved system patches shut down ins...
- Q279. A user clicked a link in an email, and now the cursor is moving around on its own. A techn...
- Q280. A customer wants to make sure the data is protected and secure on a Windows laptop's hard ...
- Q281. Which of the following ensures data is unrecoverable on a lost or stolen mobile device?...
- Q282. A technician is troubleshooting an issue on a PC that has low disk space. Which of the fol...
- Q283. A Chief Executive Officer has learned that an exploit has been identified on the web serve...
- Q284. Which of the following would MOST likely be used to change the security settings on a user...
- Q285. A user receives a call from someone who claims to be from the user's bank and requests inf...
- Q286. A user contacted the help desk to report pop-ups on a company workstation indicating the c...
- Q287. Which of the following environmental factors are most important to consider when planning ...
- Q288. When a user calls in to report an issue, a technician submits a ticket on the user's behal...
- Q289. A user needs assistance installing software on a Windows PC but will not be in the office....
- Q290. A customer, whose smartphone's screen was recently repaired, reports that the device has n...
- Q291. An analyst needs GUI access to server software running on a macOS server. Which of the fol...
- Q292. A homeowner recently moved and requires a new router for the new ISP to function correctly...
- Q293. Which of the following file extensions should a technician use for a PowerShell script?...
- Q294. A technician needs to remotely connect to a Linux desktop to assist a user with troublesho...
- Q295. Which of the following is used to ensure users have the appropriate level of access to per...
- Q296. Which of the following features can be used to ensure a user can access multiple versions ...
- Q297. A technician needs to join a Windows client to a domain. Which of the following is require...
- Q298. A company is looking lot a solution that provides a backup for all data on the system whil...
- Q299. A systems administrator is troubleshooting network performance issues in a large corporate...
- Q300. A systems administrator is configuring centralized desktop management for computers on a d...
- Q301. A user has been adding data to the same spreadsheet for several years. After adding a sign...
- Q302. A technician, who is working at a local office, has found multiple copies of home edition ...
- Q303. A technician is setting up a conference room computer with a script that boots the applica...
- Q304. An administrator needs to back up the following components of a single workstation: *The i...
- Q305. Which of the following is the weakest wireless security protocol?...
- Q306. Which of the following macOS utilities uses AES-128 to encrypt the startup disk?...
- Q307. A technician thinks that a computer on the network has been infected with malware. The tec...
- Q308. A user corrects a laptop that is running Windows 10 to a docking station with external mon...
- Q309. A user is unable to browse a website on a PC. Which of the following commands should a tec...
- Q310. A manager reports that staff members often forget the passwords to their mobile devices an...
- Q311. A user is unable to access the company's network. A technician learns the user's account b...
- Q312. Security software was accidentally uninstalled from all servers in the environment. After ...
- Q313. Which of the following would cause a corporate-owned iOS device to have an Activation Lock...
