00:00

QUESTION 36

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Correct Answer: D
The laptop has an additional option under power and sleep settings that desktops do not have. Switching to do nothing prevents the screen from turning off when closed.

QUESTION 37

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

Correct Answer: C
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. The technician should implement VPN

QUESTION 38

Which of the following best describes when to use the YUM command in Linux?

Correct Answer: A
YUM stands for Yellowdog Updater Modified and it is a command-line tool that allows users to install, update, remove, and manage software packages in Linux. YUM can be used to add functionality to a Linux system by installing new software packages or updating existing ones. To change folder permissions, show documentation, or list file contents, other commands such as chmod, man, or ls can be used in Linux.

QUESTION 39

An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?

Correct Answer: A
Before making any changes to the system, it is important to assess the risks associated with the change and determine whether it is worth implementing. Risk analysis involves identifying potential risks, assessing their likelihood and impact, and determining what steps can be taken to mitigate them. It is important to perform this step before making any changes, as this allows the administrator to make an informed decision about whether or not the change should be implemented. Once the risks have been assessed and the administrator has decided to go ahead with the change, the next step is to implement the deployment.

QUESTION 40

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

Correct Answer: B
Account lockout would best mitigate the threat of a dictionary attack1