An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?
A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?
A. Reimage the computer. B. Replace the system RAM. C. Reinstall and update the failing software. D. Decrease the page file size.
A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?
A. UEFI password B. Secure boot C. Account lockout D. Disable network drivers
A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed:
crypt32.dll is missing or not found
Which of the following should the technician attempt first?
A. Rebuild Windows profiles B. Reimage the workstation C. Roll back updates D. Perform a system file check
A user installed a new computer game. Upon starting the game, the user notices the frame rates are low.
Which of the following should the user upgrade to resolve the issue?
A. Hard drive B. Graphics card C. Random-access memory D. Monitor
A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?
A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Choose two.)
A. Implementing data-at-rest encryption B. Disabling AutoRun C. Restricting user permissions D. Restricting log-in times E. Enabling a screen lock F. Disabling local administrator accounts