M2
A technician is working with a customer who is being unreasonable. Which of the following skills should the technician use?
-Do not take complaints personally. -Identify early that the customer is angry.
A company needs to set up perimeter security to control and monitor who can approach the building. Which of the following should the company use?
-Guard -Access control vestibule -Fencing -Fencing is generally effective and needs to be transparent, so guards can see any attempt to penetrate it. -Guards can be placed in front of and around a location to protect it. They can monitor critical checkpoints and verify identification, allow, or disallow access, and log physical entry occurrences. -Access control vestibule is where one gateway leads to an enclosed space protected by another barrier that restricts access to one person at a time. Bollards are barricades that prevent vehicles from crashing into the building or exploding a bomb near it.
What are their options when a company wants to create and deliver a custom app for their employees without using a public store?
-Managed Google Play -Apple Business Manager Apple operates enterprise developer and distribution programs to allow private app distribution via Apple Business Manager. Google's Play Store has a private channel option for enterprise app distribution called Managed Google Play.
Malware encyclopedias are a resource that antivirus vendors often make available to IT professionals. What is their value for IT practitioners?
-They provide information about the type, symptoms, purpose, and removal of malware. -They are documentation of known malware. Malware encyclopedias from antivirus vendors, also called "bestiaries," maintain information about the malware that IT professionals can use to verify and remediate malware. Information includes the type of malware, the symptoms, and the purpose.
A low battery charge can cause several different problems to occur on a mobile device. Which of the following issues could stem from a low battery? (Select all that apply.)
-Weak Wi-Fi signal -Weak Bluetooth Signal Searching for wireless signals, such as Wi-Fi, or Bluetooth, consumes a lot of battery power, so if the device's battery is low, it may not have enough power to search for a strong signal.
A software developer is looking at installing a new 64-bit program that will help to streamline coding and optimize workflow. What types of systems can the developer install it on?
64-bit only -A 64-bit application requires a 64-bit CPU and OS platform. Like operating systems, software applications can be developed as 32-bit or 64-bit software. -64-bit applications cannot be installed on a 32-bit platform. Some apps may have both 32-bit and 64-bit versions.
What is a Bootleg app store?
A bootleg app store is where users can find bootleg apps that closely mimic legitimate apps; this is a way of pirating apps without paying for them. It is not a private distribution channel.
Compressed air blaster
A compressed air blaster can be used to dislodge dust from difficult-to-reach areas. When performing this sort of maintenance within a controlled area, wear an appropriate air-filter mask and goggles.
would a low battery cause an: Authorization stop
A low battery charge would not cause autorotation to stop. When a mobile device screen stops autorotating, either the rotation lock is enabled or there is a hardware issue.
APFS
Apple File System - used in macOS High Sierra or later which supports native file encryption -Where Windows uses NTFS and Linux typically uses ext3 or ext4, Apple Mac workstations and laptops use the proprietary Apple File System (APFS).
A user notices that their device has a leaking component and needs to take careful measures to minimize any risk and discard the approved component at the proper waste facility. Which of the following disposal is this?
Battery Batteries must be disposed of through an approved waste facility. Swollen or leaking batteries from devices must be handled carefully and stored within appropriate containers. Gloves and safety goggles may minimize the risk of burns from the corrosive material.
BSoD
Blue Screen of Death An error screen which appears on a Windows PC after a fatal system error. -The blue screen of death (BSoD) is mostly due to faulty hardware, especially at startup. CHKDSK scans the hard drive to find and repair errors, and it can be run in Safe Mode and many other analysis and recovery tools.
A user receives an unsolicited call from a Microsoft support technician during a normal workday. The technician says the antivirus software on the user's computer alerted Microsoft of a new malware infection. The technician needs to remote into the user's computer to fix the problem. What is the technician trying to do?
Circumvent security software. (extra info) -Microsoft does not directly support users and would never randomly contact a user. This scenario is a scam to try to steal a user's credentials. -Microsoft would not receive a malware alert because the company does not directly support users. Also, Microsoft would not contact a user. -Microsoft does not directly support users and does not receive malware alerts about any user. Moreover, the company does not call users or email users. -Microsoft does not call users and would not receive an antivirus alert that would cause the company to generate a notification.
exFAT
Extended File Allocation Table. exFAT is a 64-bit version of FAT designed for use with removable hard drives and flash media.
true or false 32-bit software application can NOT be installed on 64-bit platforms.
False 32-bit software applications can usually be installed on 64-bit platforms, however. 32-bit applications can run on 64-bit software, although if there is a 64-bit version available, it is probably better to run the 64-bit version if possible.
true or false powder Toner is hazardous to health?
False Recycling used toner cartridges is offered at most vendors. The products in toner powder are not classified as hazardous to health.
A user just installed a new application on their workstation, but the application has issues even starting up. The user has been working on the machine regularly up to this point without any prior issues. Which of the following is most likely the issue?
Firewall -In this scenario, one place to troubleshoot is the host-based firewall. Select "Allow an app through the firewall" to allow or block programs (configure exceptions) from the Windows Firewall status page.
A server administrator wants to run the latest technologies. What technology should the administrator start using which will replace the New Technology File System (NTFS)?
ReFS (Resilient File System (ReFS) is being developed to replace NTFS. ReFS is only available for Pro for Workstations and Enterprise editions and cannot currently be used for the boot volume.)
A user likes to watch Netflix on their phone while on the treadmill. The user turns the phone sideways for better viewing, but this time, the picture did not orient to landscape as it always has. Which of the following could cause this issue?
Rotation lock is enabled. -When a screen does not autorotate, it could be that the rotation lock is enabled. In iOS, the rotation lock is found in the Control Center. In Android, the rotation lock is found in the navigation bar. -If the rotation lock is disabled, the screen should autorotate. If it does not, the problem is probably hardware-related. -
A user calls the help desk complaining that Windows freezes to a blue screen every time it tries to boot. When the technician arrives, they boot the computer in Safe Mode. After evaluating this situation, what is the BEST reason the technician wants to enter Safe Mode to begin troubleshooting?
Safe Mode loads only the minimum amount of drivers and services to start the system. -By using only essential drivers and services to boot, Safe Mode can boot the computer when a normal boot fails, as in this scenario. -Safe Mode allows antivirus scans to run in an environment that will not trigger viruses or malware.
screen lock enabled and disabled difference?
Screen Lock is a security feature for mobile devices. If enabled, it activates if the device is unused or the user activates it. Most devices require a pin or password to unlock the screen. Screen Lock is a security feature for mobile devices. If it is disabled, no pin or password is required. Generally, some swipe gestures will unlock the screen.
Which of the following devices come in the form of adapters, trailing sockets, or filter plugs, with the protection circuitry built into the unit?
Surge suppressor -Surge suppressors are passive protection devices that can filter out the effects of surges and spikes.
ext3
Third Extended File System. Commonly used by Linux OS. -Most Linux distributions use some version of the extended (ext) file system to format partitions on mass storage devices. ext3 is a 64-bit file system with journaling support. -Where Windows uses NTFS and Linux typically uses ext3 or ext4, Apple Mac workstations and laptops use the proprietary Apple File System (APFS).
A transportation company wants to set up software that gathers statistics from the controller area network for trailers hauling loads, enabling them to adjust processes to optimize cost savings. What type of adapter will the company need to send the statistics back to their cloud network?
WWAN -Wireless Wide Area Network (WWAN) uses a cellular adapter to connect to the internet via a provider's network. These networks are typically metered with a set data limit. -While WWAN could be considered wireless, wireless generally refers to a computer that connects to the 2.4 or 5 GHz spectrum with a limited physical range.
A manager for a Linux server team recently purchased new software which will help to streamline operations, but they are worried that in IT, there is a high turnover of personnel. The manager wants to ensure they can obtain updates, monitor and fix security issues, and are provided technical assistance. What impact is the manager trying to mitigate?
support -Given the unpredictable state of IT staffing, the software might be available with paid-for support to obtain updates, monitor and fix security issues, and provide technical assistance.
true or false Antistatic bags are packages that reduce the risk of ESD because it is coated with a conductive material.
true
true or false If the user has been using the machine without any previous problems it is unlikely that the domain name system (DNS) is the issue.
true
true or false While proxy settings could be an issue, if the user is working fine beforehand, proxy settings are not likely to be an issue.
true
true or false Anti-ESD wrist straps should fit snugly around the wrist or ankle so that the metal stud makes contact with the skin. Wearing an anti-ESD wrist strap causes the static charge to dissipate more effectively.
true