A technician is using a credential manager to safeguard a large number of credentials. Which of the following is important for using this application?
A credential manager encrypts and stores multiple credentials behind a single master password. Ensuring that this master password is strong and kept secure is critical; if it's compromised, all stored credentials become vulnerable.
A technician notices that the weekly backup is taking too long to complete. The daily backups are incremental. Which of the following would most likely resolve the issue?
Synthetic full backups consolidate the most recent full backup and subsequent incremental backups into a new full backup on the backup storage, without repeatedly reading all data from the production systems. This approach significantly reduces the time impact on the network and source systems during the weekly backup window while still providing a full backup set for restoration.
Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?
Standard operating procedures (SOPs) define consistent, step-by-step guidelines that technicians must follow - such as capturing user contact details, asset tags, and detailed issue descriptions on every ticket. Implementing SOPs ensures thorough and uniform documentation across all calls.
An application's performance is degrading over time. The application is slowing, but it never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?
Resource Monitor provides real-time insights into CPU, memory, disk, and network usage by process. By observing which resources steadily increase or become bottlenecks over time, a technician can pinpoint leaks (e.g., memory), I/O contention, or other performance issues driving the slowdown.
SIMULATION
As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:
All phishing attempts must be reported.
Future spam emails to users must be prevented.
INSTRUCTIONS
Review each email and perform the following within the email:
Classify the emails
Identify suspicious items, if applicable, in each email
Select the appropriate resolution
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Inbox mail 1 - Account Locked- Phishing - Report email to Information Security
Inbox mail 2 - Share your feedback - Legitimate - Perform no additional actions
Inbox mail 3 -- Employee orientation - Legitimate - Perform no additional actions
Inbox mail 4 -- Security Update -- Spam - Report email to Information Security
Inbox mail 5 -- Interview - Legitimate - Perform no additional actions
Leonor
2 days agoBenedict
3 days ago