h company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?
A technician needs to configure a newly installed SSD. Which of the following tools should the technician use? (Select two).
A user's computer was infected with a Trojan. The user thinks the Trojan was introduced when clicking on a malicious link in an email. Which of the following actions should the technician take to prevent further damage to the computer?
A company’s help desk receives numerous calls from employees reporting issues related to a current security breach. Which of the following steps should the help desk team take to document the breach?
A user accidentally deleted an important presentation from the desktop of a workstation. The presentation was created after the most recent daily corporate backup. As a result, the technician is unable to restore the presentation. Which of the following should the technician enable to prevent this issue from occurring in the future?
A user's home system has been infected with malware. A technician has isolated the system from the network and disabled System Restore. Which of the following should the technician do next?
A technician is working at a client office site, and the technician’s family member repeatedly calls and texts about a non-emergency situation. Which of the following should the technician do?
A home office user wants to ensure a PC is backed up and protected against local natural disasters and hardware failures. Which of the following would meet the user's requirements?
A user asks a technician for recommendations to back up desktop data from a Windows OS. The technician recommends implementing daily full backups, but the user is concerned about having enough space. Which of the following additional backup methods should the technician recommend?
A technician needs to override DNS and map IP addresses and URLs to different locations. Which of the following should the technician do?
Which of the following Windows 10 editions is the most cost-effective and appropriate for a single user who needs to access their computer remotely?
A technician is configuring security for a computer that is located in a common area. A sign above the computer indicates only authorized users can use the computer. Guests visiting the office must walk past the computer to enter and leave the office. Which of the following will offer the best protection against physical threats?
A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?
A user with a disability needs to be able to press the Ctrl+Alt+Del keyboard sequence one key at a time. Which of the following turns on this Ease of Access feature?