A user's smartphone screen is not rotating. The technician confirms the rotation lock is deactivated. Which of the following steps should the technician perform next?
A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?
A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?
Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.
Click on individual tickers to see the ticket details. View attachments to determine the problem.
Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

An organization has a goal to perform daily backups of a particular workstation and save them locally to the NAS. The organization needs to ensure these backup jobs are successful. Which of the following should the IT department do?
A user's enterprise-issued smartphone does not respond to touch after starting up the operating system. Which of the following should a technician try next?
Which of the following is the most secure method of preventing someone from accessing a cell phone?
Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?
A technician is setting up backup and recovery solutions that must restore quickly. Storage space is not a factor. Which of the following backup methods should the technician implement?
A user's PC is performing slowly after the user clicked on a suspicious email attachment. The technician notices that a single process is taking 100% of RAM, CPU, and network resources. Which of the following should the technician do first?
A technician needs to configure a newly installed SSD. Which of the following tools should the technician use? (Select two).
A technician received a notification about encrypted production data files and thinks active ransomware is on the network. The technician isolated and removed the suspicious system from the network. Which of the following steps should the technician take next?
A company needs to securely and remotely access network devices. Which of the following will allow the company to access these devices?
Which of the following are common commands that are used when installing applications in Linux? (Select two).
A technician is configuring security for a computer that is located in a common area. A sign above the computer indicates only authorized users can use the computer. Guests visiting the office must walk past the computer to enter and leave the office. Which of the following will offer the best protection against physical threats?
An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?
Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?
A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?