Which of the following BEST describes the ethical issue that was committed?
A staff nurse was entering patient's clinical notes in the computer, and had to leave to attend an immediate call without completion of recording. Another nurse used the account of the previous nurse to enter her notes. Which of the following BEST describes the ethical issue that was committed?A ....
Which of the following should the team implement?
A project team wants to provide compliant cycling infrastructure for its occupants to fulfill a WELL feature. Which of the following should the team implement?A . The project is located near a bike network that connects riders to five use typesB . Long-term bike parking (e.g., bike room) can accommodate...
Which of the following commands will accomplish this task?
A systems administrator needs to clone the partition /dev/sdc1 to /dev/sdd1. Which of the following commands will accomplish this task?A . tar -cvzf /dev/sdd1 /dev/sdc1B . rsync /dev/sdc1 /dev/sdd1C . dd if=/dev/sdc1 of=/dev/sdd1D . scp /dev/sdc1 /dev/sdd1View AnswerAnswer: C Explanation: The command dd if=/dev/sdc1 of=/dev/sdd1 copies the data from the...
Which of the following types of attacks does this scenario describe?
A bad actor tries to persuade someone to provide financial information over the phone in order to gain access to funds. Which of the following types of attacks does this scenario describe?A . VishingB . PhishingC . Spear phishingD . WhalingView AnswerAnswer: A Explanation: Vishing is a social engineering attack...
What is the expected behavior if an automation rule is NOT set to repeat?
What is the expected behavior if an automation rule is NOT set to repeat?A . The prospect can match the criteria multiple times and the action runs each time.B . The action can only run once per day on the prospect.C . The prospect matches the criteria once, but the...
Which of the following BEST describes why this script triggered a `probable port scan` alert in the organization's IDS?
autonumA penetration tester ran a simple Python-based scanner. The following is a snippet of the code: Which of the following BEST describes why this script triggered a `probable port scan` alert in the organization's IDS?A . sock.settimeout(20) on line 7 caused each next socket to be created every 20 milliseconds.B...
What should you use?
You need to create the evaluation record for a prospect. What should you use?A . a plug-inB . a cloud flowC . a quick create formD . a classic Dataverse workflowView AnswerAnswer: C
Which of the following items must be protected as Pll? (Select TWO).
Which of the following items must be protected as Pll? (Select TWO).A . Job titleB . Home addressC . Work phone numberD . Time zoneE . Date of birthF . Blood typeView AnswerAnswer: B,E Explanation: Home address and date of birth must be protected as personally identifiable information (PII). PII...
The calipers in this image measure which performance characteristic of a system?
The calipers in this image measure which performance characteristic of a system? A . Depth measurement accuracyB . Dynamic rangeC . Axial resolutionD . Lateral resolutionView AnswerAnswer: A Explanation: The calipers shown in the image are used to measure the depth of structures within the ultrasound image. This performance characteristic,...
Which Cortex XDR agent capability prevents loading malicious files from USB-connected removable equipment?
Which Cortex XDR agent capability prevents loading malicious files from USB-connected removable equipment? a. Device control b. Agent management c. Agent configuration d. Device customizationView AnswerAnswer: A