A computer running Windows 7 has an icon that has the appearance of an unlocked padlock with a yellow warning graphic. This icon advises the user that:
A technician was alerted by IT security of a potentially infected desktop, which is at a remote location The technician will arrive on site after one hour Which of the following steps should be performed prior to traveling to prevent further infection'' (Select TWO).
Ann. a network engineer is performing an after-hours upgrade on a network switch During the activity. Ann notices an unrelated setting she believes is misconfigured She decides to change the setting during the upgrade which causes an outage. Which of the following change management practices would MOST likely have prevented this outage?
A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?
A technician is cleaning up a warehouse and several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.
Which of the following should the technician do NEXT to proceed with disposal of the batteries?
A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups Which of the following should a technician do to resolve these issues? (Select TWO)
A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.
Which of the following actions should be taken to close the vulnerability? (Select two.)
A technician is setting up a new laptop for a doctor to take to a conference. The laptop contains private health information, and the technician needs to ensure the laptop is protected from unauthorized access in case it us lost or stolen. Which of the following the technician implement the BEST meet this requirement? (Select TWO.)