Which of the following prevents forced entry into a building?
Bollards are sturdy, fixed posts installed around buildings or sensitive areas to physically block vehicles and prevent ramming attacks or forced vehicular entry. Unlike surveillance or lighting, bollards provide a direct physical barrier.
A technician is using a credential manager to safeguard a large number of credentials. Which of the following is important for using this application?
A credential manager encrypts and stores multiple credentials behind a single master password. Ensuring that this master password is strong and kept secure is critical; if it's compromised, all stored credentials become vulnerable.
A technician notices that the weekly backup is taking too long to complete. The daily backups are incremental. Which of the following would most likely resolve the issue?
Synthetic full backups consolidate the most recent full backup and subsequent incremental backups into a new full backup on the backup storage, without repeatedly reading all data from the production systems. This approach significantly reduces the time impact on the network and source systems during the weekly backup window while still providing a full backup set for restoration.
Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?
Standard operating procedures (SOPs) define consistent, step-by-step guidelines that technicians must follow - such as capturing user contact details, asset tags, and detailed issue descriptions on every ticket. Implementing SOPs ensures thorough and uniform documentation across all calls.
An application's performance is degrading over time. The application is slowing, but it never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?
Resource Monitor provides real-time insights into CPU, memory, disk, and network usage by process. By observing which resources steadily increase or become bottlenecks over time, a technician can pinpoint leaks (e.g., memory), I/O contention, or other performance issues driving the slowdown.
Jerry
10 days agoRoy
12 days agoMa
1 months agoLeonor
2 months agoBenedict
2 months ago