Topic 5: Exam Pool E
Which of the following file extensions should a technician use for a PowerShell script?
A. .ps1
B. .py
C. .sh
D. .bat
E. .cmd
Explanation: A PowerShell script is a plain text file that contains one or more PowerShell commands. Scripts have a .ps1 file extension and can be run on your computer or in a remote session. PowerShell scripts can be used to automate tasks and change settings on Windows devices. To create and run a PowerShell script, you need a text editor (such as Visual Studio Code or Notepad) and the PowerShell Integrated Scripting Environment (ISE) console. You also need to enable the correct execution policy to allow scripts to run on your system
A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?
A. Deploy a secondary hard drive with encryption on the appropriate workstation
B. Configure a hardened SFTP portal for file transfers between file servers
C. Require files to be individually password protected with unique passwords
D. Enable BitLocker To Go with a password that meets corporate requirements
Explanation:
The BEST way to secure the current workflow of transferring sensitive personal information
between offices when conducting business is to enable BitLocker To Go with a password
that meets corporate requirements. This is because BitLocker To Go is a full-disk
encryption feature that encrypts all data on a USB drive, which is what the company
currently uses, and requires a password to access the data.
A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).
A. Examine the event logs.
B. Connect to the network.
C. Document the findings.
D. Update the definitions.
E. Reimage the computer.
F. Enable the firewall.
Which of the following should be documented to ensure that the change management plan is followed?
A. Scope of the change
B. Purpose of the change
C. Change rollback plan
D. Change risk analysis
Explanation: The scope of the change is one of the elements that should be documented to ensure that the change management plan is followed. The scope of the change defines the boundaries and limitations of the change, such as what is included and excluded, what are the deliverables and outcomes, what are the assumptions and constraints, and what are the dependencies and risks. The scope of the change helps to clarify the expectations and objectives of the change, as well as to prevent scope creep or deviation from the original plan. The scope of the change also helps to measure the progress and success of the change, as well as to communicate the change to the stakeholders and the team
A department has the following technical requirements for a new application:
A. CPU
B. Hard drive
C. RAM
D. Touch screen
Explanation:
https://www.makeuseof.com/tag/difference-32-bit-64-bit-windows/
After upgrading from a 32-bit Windows OS to a 64-bit OS, the company will be able to fully
take advantage of the RAM of the computer. This is because a 64-bit operating system is
able to use larger amounts of RAM compared to a 32-bit operating system, which may
benefit the system’s overall performance if it has more than 4GB of RAM installed
Page 8 out of 148 Pages |
Previous |