A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?
A. VPN
B. ACL
C. RDP
D. DLP
CompTIA exam questions
A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?
A. VPN
B. ACL
C. RDP
D. DLP
Which of the following would a technician use to search for a specific string within a file name?
A. grep
B. chmod
C. wget
D. sudo
A Windows workstation is suspected of having malicious software that created an infected start-up item or service. Which of the following tools would a technician use to test this theory?
A. chkdsk
B. msconfig
C. dxdiag
D. ipconfig
When dealing with a difficult customer, which of the following is the BEST way to handle the situation?
A. Do not argue with the customer and/or be defensive
B. Use technical terms to assure customer confidence
C. Escalate the customer’s issue to a supervisor
D. Sympathize with the customer about issue
An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?
A. Antivirus software
B. Internet connectivity issues
C. Ransomware infection
D. Content-filtering
A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? (Select TWO).
A. Rename default accounts
B. Disable Windows Update
C. Configure single sign-on
D. Run gpupdate tool
E. Disable guest account
F. Disable Action Center pop-ups
Jane, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open?
A. Backup
B. Recovery Image
C. chkdsk
D. System Restore
An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?
A. The HIPS device is blocking the messages
B. The access control list is blocking the messages
C. The email filter has quarantined the messages
D. The firewall is blocking the sender’s email address
A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?
A. Change the router firewall settings
B. Check for and apply a firmware update
C. Reconfigure the QoS settings
D. Change router user-names and passwords
A turnstile is an example of which of the following forms of physical security?
A. Entry control roster
B. Biometrics
C. Mantrap
D. Cipher lock