Which of the following is MOST likely contained in an EULA?

Which of the following is MOST likely contained in an EULA?A . Chain of custodyB . Backup of software codeC . Personally identifiable informationD . Restrictions of useView AnswerAnswer: D Explanation: An EULA (End-User License Agreement) is a legally binding contract between a software supplier and a customer or end-user,...

March 11, 2025 No Comments READ MORE +

Which of the following is the MOST likely next step in the change process?

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process? A. End user acceptance B. Perform risk analysis C. Communicate to stakeholders D. Sandbox testingView AnswerAnswer: C Explanation: A. End user acceptance - While this is an...

March 10, 2025 No Comments READ MORE +

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:A...

March 9, 2025 No Comments READ MORE +

Which of the following BEST describes the change in policy?

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?A . Login timesB . Screen lockC . User permissionD . Login lockout attemptsView AnswerAnswer: B Explanation: Screen lock is...

March 9, 2025 No Comments READ MORE +

Which of the following attacks MOST likely occurred?

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute forceB . Zero dayC . Denial of serviceD . On-pathView AnswerAnswer: B Explanation: A zero-day attack...

March 7, 2025 No Comments READ MORE +

Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows...

March 5, 2025 No Comments READ MORE +

Which of the following backup methods would BEST meet the requirements?

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?A ....

March 4, 2025 No Comments READ MORE +

Which of the following should a technician investigate NEXT to resolve the issue?

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?A . Enable firewall ACLs.B . Examine the localhost file entries.C . Verify...

March 4, 2025 No Comments READ MORE +

Which of the following is a data security standard for protecting credit cards?

Which of the following is a data security standard for protecting credit cards?A . PHIB . NISTC . PCID . GDPRView AnswerAnswer: C Explanation: The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or...

March 3, 2025 No Comments READ MORE +

Which of the following can the technician MOST likely do to defend against this threat?

A network technician installed a SOHO router for a home office user. The user has read reports about home routers being targeted by malicious actors and then used in DDoS attacks. Which of the following can the technician MOST likely do to defend against this threat?A . Add network content...

March 1, 2025 No Comments READ MORE +