Which of the following ensures data is unrecoverable on a lost or stolen mobile device?
An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?
An organization's critical database files were attacked with ransomware. The company refuses to pay the ransom for a decryption key. All traces of the infection have been removed from the underlying servers. Which of the following should the company do next?
A technician assigns the equivalent of root-level permissions to a user to perform a task. Which of the following user roles within the Windows OS should the technician choose?
A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?
An Internet cafe has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?
Which of the following Is a package management utility for PCs that are running the Linux operating system?
A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?