A helpdesk operator wants to use a set of tools that will help them during troubleshooting. What can help the operator customize their toolset?
Blog
A computer technician wants to optimize the input/output ope…
A computer technician wants to optimize the input/output operations performance of HDDs. What should the technician utilize?
A penetration tester gains access to a regular user’s box. T…
A penetration tester gains access to a regular user’s box. The tester wants to escalate privileges, so they call into the help desk, as the regular user, and sets up a script that will capture the help desk user’s Kerberos token to be able to replay. What is this social engineering technique called?
A server administrator performs a statistical analysis on se…
A server administrator performs a statistical analysis on server operations to provide optimized resources. For example, the administrator wants to see resource performance graphs and key statistics, such as threads started by a process or hard page faults/second. What is the best tool to use?
A user wants to use the netstat command but is unfamiliar wi…
A user wants to use the netstat command but is unfamiliar with the different parameters. What can they use to learn more? (Select all that apply.)
The Vision group in the Ease of Use settings in Windows 10 c…
The Vision group in the Ease of Use settings in Windows 10 contains several settings that aid for vision-impaired individuals. These settings include display, magnifier, high contrast, and narrator. Where can the user go to enable this?
A startup company wants to sell laptops and desktops with op…
A startup company wants to sell laptops and desktops with operating systems that are ready to use for customers. What type of license is most applicable in this situation?
A user starts experiencing a BSoD. What should the user chec…
A user starts experiencing a BSoD. What should the user check for changes when they are able to get back on their computer?
A security analyst is investigating a possible incident and…
A security analyst is investigating a possible incident and wants to view the logs on a remote computer. What should the security analyst use to accomplish this?
A manager is responsible for client laptops, and is concerne…
A manager is responsible for client laptops, and is concerned about exposing data on the disks to a different OS and the permissions becoming overridden. What will help prevent this possible attack?