Question 156

Which of the following must be enabled to configure 20 new machines to be booted over a network?
  • Question 157

    A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:
    There are 1033 infected files on this computer. Click here to disinfect.
    The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?
  • Question 158

    A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
    Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
  • Question 159

    A systems administrator created a policy that should create a shortcut on a user's desktop Shortly after the policy was created, a technician inspects the user's desktop and notices the shortcut is not present. The administrator verifies that the policy was created correctly and that it is being applied to the user's account.
    Which of the following will MOST Likely resolve the issue Immediately without interrupting the user's session?
  • Question 160

    A technician Is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process. Which of the following should the technician complete NEXT?