IT Questions Bank A technician suspects that a security issue is causing problems with a computer. What two actions could be performed to test theories of probable cause when troubleshooting the PC? (Choose two.)IT Administrator asked 4 years ago • IT EssentialsWhen responding to a call from a customer who is experiencing problems with a computer, the technician notices that a number of system files on the computer have been renamed. Which two possible solutions could the technician implement to resolve the problem? (Choose two.)IT Administrator asked 4 years ago • IT EssentialsWhich methods can be used to implement multifactor authentication?IT Administrator asked 4 years ago • IT Essentials, Cybersecurity EssentialsWhat is the difference between a scripting language and a compiled language?IT Administrator asked 4 years ago • IT EssentialsA bench technician enters the server room and finds the backup server computer case open. The hard drives containing patient medical data are all physically disconnected from the motherboard and the SATA data cables are hanging outside the case. Which step should the technician immediately take?IT Administrator asked 4 years ago • IT EssentialsWhat determines the level of support that a call center technician will provide to an individual customer?ITExamAnswers asked 4 years ago • IT EssentialsWhat is used to control illegal use of software and content?IT Administrator asked 4 years ago • IT EssentialsWhat skill is essential for a level one technician to have?IT Administrator asked 4 years ago • IT EssentialsRefer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?ITExamAnswers asked 4 years ago • IT EssentialsIn a computer forensics investigation, which type of data is considered volatile data and can be lost if power is removed from the computer?ITExamAnswers asked 4 years ago • IT EssentialsWhich subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an investigation of alleged illegal activity?IT Administrator asked 4 years ago • IT EssentialsA third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)IT Administrator asked 4 years ago • IT EssentialsAn IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)IT Administrator asked 4 years ago • IT EssentialsWhat two kinds of problems should be escalated from a level one technician to a level two technician? (Choose two.)IT Administrator asked 4 years ago • IT EssentialsA support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)IT Administrator asked 4 years ago • IT Essentials