لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?
A. Disk Cleanup
B. Group Policy Editor
C. Disk Management
D. Resource Monitor
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?
A. Run the virus scanner in an administrative mode
B. Reinstall the operating system
C. Reboot the system in safe mode and rescan
D. Manually delete the infected files
عرض الإجابة
اجابة صحيحة: C
السؤال #3
A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a button labeled Accept Which of the following agreements IS MOST likely in use?
A. DRM
B. NDA
C. EULA
D. MOU
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?
A. The SNTP server is offline
B. A user changed the time zone on a local machine
C. The Group Policy setting has disrupted domain authentication on the system,
D. The workstations and the authentication server have a system clock difference
عرض الإجابة
اجابة صحيحة: C
السؤال #5
A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?
A. Full
B. Differential
C. Off-site
D. Grandfather-father-son
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Which of the following should be used to control security settings on an Android phone in a domain environment?
A. MDM
B. MFA
C. ACL
D. SMS
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?
A. Scan and remove the malware
B. Schedule automated malware scans
C. Quarantine the system
D. Disable System Restore
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:
A. acceptable use policy
B. regulatory compliance requirements
C. non-disclosure agreement
D. incident response procedures
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: