Question 381
A user's computer was infected with malware, and a technician successfully removed the infection. However, the user reports certain web-based services are still inaccessible.
Which of the following should the technician perform FIRST to resolve the issue?
Which of the following should the technician perform FIRST to resolve the issue?
Question 382
A junior technician needs to obtain a list of all the processes that are running on Linux system.
Which of the following commands should the technician use to obtain the information?
Which of the following commands should the technician use to obtain the information?
Question 383
A small business has an open wireless network so vendors can connect to the network without logging in.
The business owners are concerned that a nearby company is connecting and using the wireless
connection without permission. If the small business requires that the network remain open, which of the
following configuration settings should be changed to address these concerns?
The business owners are concerned that a nearby company is connecting and using the wireless
connection without permission. If the small business requires that the network remain open, which of the
following configuration settings should be changed to address these concerns?
Question 384
Given the following batch file:

Which of the following describes the purpose of the line beginning with rem?

Which of the following describes the purpose of the line beginning with rem?
Question 385
Over the years a user has been accidentally creating copies of folders in a personal drive and as a result, there are now hundreds of "copy of copy" folders dotted throughout the drive.
Which of the following Windows command line tools might a technician use to obtain a complete list of all the folders for use in a deletion script?
Which of the following Windows command line tools might a technician use to obtain a complete list of all the folders for use in a deletion script?