Which of the following are system folders on macOS? (Select two) ANS: Applications and FileVault
A technician needs to install an operating system on a large number of workstations. Which
of the following is the fastest method? ANS: Image deployment
An organization sees unauthorized apps installed and licensing prompts. What should the
security team do? ANS: Remove users from the local admin group.
An administrator received an email stating that the OS they are currently supporting will no
longer be issued security updates and patches. Which of the following is most likely the
reason the administrator received this message? ANS: The OS will be considered end of life
A user is unable to use the latest version of an app on a legacy tablet. What is the most likely
reason? ANS: The OS is end-of-life
A company would like to deploy baseline images to new computers as they are started up on
the network.
Which of the following boot processes should the company use for this task? ANS: PXE
A technician completes the installation of an OS that appears to be successful. However,
when the technician removes the USB drive that was used for the installation and restarts the
system, the error "No boot device found" appears. Which of the following should the
technician do next to resolve the issue? ANS: Enable UEFI devices in the BIOS
,Which of the following concepts should a technician consider when discussing confidential
work projects with individuals outside the company? ANS: NDA
A secretary receives an email from the company's chief executive officer with a request to
pay a vendor immediately. After the payment is made, the CEO informs the secretary that
they never sent that email. Which of the following social engineering tactics best describes
this type of attack? ANS: Whaling
A technician needs to download and install a new web browser on a desktop. Which attribute
should be used to verify the installer's authenticity? ANS: Hash
An administrator received an email stating that the OS they are currently supporting will no
longer be issued security updates and patches. Which of the following is most likely the
reason the administrator received this message? ANS: The OS will be considered end of life
Which of the following types of social engineering attacks sends an unsolicited text message
to a user's mobile device? ANS: Smishing
An administrator is investigating a technical outage. The management team wants
information that includes the summary of the outage and actions taken. Which of the
following documentation should the administrator provide? ANS: Incident report
A help desk technician is setting up speech recognition on a Windows system. Which of the
following settings should the technician use? ANS: Ease of Access
, Which of the following file types would a desktop support technician most likely use to
automate tasks for a Windows user log-in? ANS: .bat
Which of the following is the best reason for a network engineering team to provide a help
desk technician with IP addressing information to use on workstations being deployed in a
secure network segment? ANS: DHCP services are not enabled for this subnet.
A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop
technician finds the following information:
Battery charge: 25%
Battery health: 90%
Hotspot: On
Mobile reception: |||
Roaming: Off
Used space: 63.76GB/64GB
Which of the following is the cause of the issue? ANS: The device is running out of free space
After using a third-party disk optimization software package, a technician restarts a laptop
and receives the message "No operating system found." The technician verifies that the
BIOS properly recognizes the SSD.
Which of the following should the technician do next? ANS: Boot from installation media and repair the
MBR
A user takes an iOS-based smartphone to a repair shop due to performance issues. The
technician observes:
Battery charge: 25%