Topic 1: Exam Pool A
A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method
A. Reinstalling Windows
B. Performing a quick format
C. Using disk-wiping software
D. Deleting all files from command-line interface
Explanation:
Using disk-wiping software is the most secure method for removing information from past
users’ hard drives in order to reuse the hard drives. Disk-wiping software can help to
ensure that all data on the hard drive is completely erased and cannot be recovered.
Which of the following is also known as something you know, something you have, and something you are? ACL
A. MFA
B. SMS
C. NFC
Explanation:
MFA stands for Multi-Factor Authentication, which is a method of verifying a user’s identity using two or more different factors of authentication. The three factors of authentication are something you know, something you have, and something you are. These factors correspond to different types of information or evidence that only the legitimate user should possess or provide. For example:
Something you know: a password, a PIN, a security question, etc.
Something you have: a smart card, a token, a mobile device, etc. Something you are: a fingerprint, a face, an iris, etc.
MFA provides a higher level of security than single-factor authentication, which only uses one factor, such as a password. MFA reduces the risk of unauthorized access, identity theft, and data breaches, as an attacker would need to compromise more than one factor to impersonate a user. MFA is commonly used for online banking, email accounts, cloud services, and other sensitive applications
A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?
A. Privacy
B. Indexing Options
C. System
D. Device Manager
Explanation:
To exclude an application folder from being cataloged by a Windows 10 search, the
technician should use the Indexing Options utility1.
An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices? Devices and Printers
A. Ease of Access
B. Programs and Features
C. Device Manager
A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?
A. Encrypting File System
B. FileVault
C. BitLocker
D. Encrypted LVM
Explanation:
The encryption solution that the technician should choose when configuring a new
Windows laptop and corporate policy requires that mobile devices make use of full disk
encryption at all times is BitLocker. This is because BitLocker is a full-disk encryption
feature that encrypts all data on a hard drive and is included with Window
A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?
A. c: \minutes
B. dir
C. rmdir
D. md
Explanation: The command md stands for make directory and is used to create a new directory or folder in the current location. In this case, the technician can use md minutes to create a folder named minutes in the C: drive. The other commands are not relevant for this task. c: \minutes is not a command but a path to a folder. dir is used to display a list of files and folders in the current directory. rmdir is used to remove or delete an existing directory or folder.
A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements?
A. PIN
B. Username and password
C. SSO
D. Fingerprint
This is because a PIN is a fast and secure method of logging in to laptops, and it is more secure than a password because it is not susceptible to keyloggers.
A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer. Which of the following security measures should the user take to ensure security and privacy?
A. Only accept calls from known people.
B. Disregard any suspicious emails.
C. Update the antivirus software.
D. Enable two-factor authentication.
E. Install a malware scanner.
As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?
A. Use Settings to access Screensaver settings
B. Use Settings to access Screen Timeout settings
C. Use Settings to access General
D. Use Settings to access Display.
Explanation:
The systems administrator should use Settings to access Screensaver settings to configure
each user’s Windows device to require a password when resuming from a period of sleep
or inactivity1.
A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism?
Do not notify the customer if arriving before the customer.
A. Dismiss the customer and proceed with the after-hours work.
B. Contact the customer if the technician is arriving late.
C. Disclose the experience via social media.
Page 11 out of 74 Pages |
Previous |