Question 31
A technician needs to recommend a disaster recovery solution for a company that has three offices across two states. The technician must ensure the solution has:
* The ability to centralize data backups
* High availability
* The ability to synchronize user data to local machines
Which of the following solutions will the technician MOST likely recommend? (Choose two.)
* The ability to centralize data backups
* High availability
* The ability to synchronize user data to local machines
Which of the following solutions will the technician MOST likely recommend? (Choose two.)
Question 32
A MAC user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.
Which of the following built-in utilities should be used?
Which of the following built-in utilities should be used?
Question 33
An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue?
Question 34
Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users.
Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
Question 35
Joe, an end user, has been prompted to provide his username and password to access the payroll system.
Which of the followingauthentication methods is being requested?
Which of the followingauthentication methods is being requested?