Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed The technician investigates and determines the PC is not infected with any viruses or malware.
Which of the following should the technician check NEXT?
A. Hijacked email
B. DNS entries
C. Hosts file
D. POP3 errors
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?
A. Unattended installation
B. Refresh upgrade
C. Clean installation
D. In-place upgrade
An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers?
A. Uninterruptible power supply
B. Voltage regulator
C. Surge suppressor
D. Generator
The management team has issued a new directive that states a certain string is no longer allowed in any of the names on any of the Linux workstation. Which of the following commands would a technician issue to find all the instances of the unwanted string on a workstation?
A. Ps aux | gre `string'
B. Cd | mv `string'
C. is |Grep `string'
D. dd / | rm `string'
A technician implemented a network policy to deploy a printer over the network. A user reports being unable to see the printer. Which of the following should the technician perform to map the printer to user laptops?
A. netstat
B. gpresult
C. net use
D. gpupdate
Joe. a user, is receiving automated replies but does not remember sending any emails to those recipients He checks the sent items folder and sees email messages he did not send
Which of the following would be the BEST way to resolve this issue?
A. Reset Joe's email password
B. Set up a rule to delete the automated replies
C. Mark the automated replies as spam
D. Rebuild Joe's profile
A user's company phone was recently wiped. The user Is unsure if an IT administrator wiped the phone or if it was the result of a hacking attempt. A new company policy was recently implemented to tighten security. The new policy requirements include:
1.
An allowance for the remote wiping of company data
2.
PIN unlock
3.
Failed-attempt device wiping
The user normally keeps the phone in a pocket, so it is unlikely that anyone else had access to It. Which of the following is the MOST likely cause of the device being wiped?
A. Unauthorized remote access
B. A system lockout
C. A virus
D. A faulty device
A user downloaded a program from a website. After saving the file, the user cannot find the executable.
Which of the following is MOST likely the cause?
A. The file was quarantined by an anti-malware software.
B. The host-based firewall blocked the download.
C. The file is incompatible with the operating system.
D. File permissions do not allow the user to access the file.
Which of the following can be used to help recover a lost smartphone?
A. Remote support software
B. Locator application
C. NFC enabled device
D. GPS navigation software
After confirming BIOS support, technician has added a second video card and a new sound card to a computer's motherboard. The computer continuously restarts. This is an indication of which of the following.
A. Incompatible sound card
B. Insufficient power supply
C. Insufficient memory
D. Defective video card