5/49 questions · Unlock full access
Q1

A system administrator contacts the IT support team because field technicians cannot access a Ubuntu server used for monitoring tools. When the administrator attempts to use remote desktop to connect to the server, the desktop environment appears to be unstable and crashing repeatedly. Which of the following remote access methods should the administrator use to effectively troubleshoot this server?

Q2

An IT department needs to securely dispose of solid-state drives from decommissioned workstations before donating the computers to a local school. Which of the following provides the MOST secure data destruction method?

Q3

A user reports that their smartphone is experiencing unusual behavior after downloading a productivity app from the official app store. The device now shows excessive data usage and displays persistent security notifications. Which of the following actions should the technician take FIRST to address this issue?

Q4

A project steering committee has just approved a software deployment change request. Which of the following represents the MOST appropriate next phase in the change management process?

Q5

A user contacts technical support reporting that their workstation files have become inaccessible, and there is a program on the screen demanding cryptocurrency payment to restore access. A technician confirms the system is infected with ransomware. Which of the following should the technician perform FIRST?