Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
Correct Answer:
A
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?
Correct Answer:
D
Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue?
Correct Answer:
C
A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?
Correct Answer:
A
A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor.
Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?
Correct Answer:
A