Which of the following BEST describes the change in policy?

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?A . Login timesB . Screen lockC . User permissionD . Login lockout attemptsView AnswerAnswer: B Explanation: Screen lock is...

March 9, 2025 No Comments READ MORE +

Which of the following attacks MOST likely occurred?

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute forceB . Zero dayC . Denial of serviceD . On-pathView AnswerAnswer: B Explanation: A zero-day attack...

March 7, 2025 No Comments READ MORE +

Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows...

March 5, 2025 No Comments READ MORE +

Which of the following backup methods would BEST meet the requirements?

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?A ....

March 4, 2025 No Comments READ MORE +

Which of the following should a technician investigate NEXT to resolve the issue?

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?A . Enable firewall ACLs.B . Examine the localhost file entries.C . Verify...

March 4, 2025 No Comments READ MORE +

Which of the following is a data security standard for protecting credit cards?

Which of the following is a data security standard for protecting credit cards?A . PHIB . NISTC . PCID . GDPRView AnswerAnswer: C Explanation: The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or...

March 3, 2025 No Comments READ MORE +

Which of the following can the technician MOST likely do to defend against this threat?

A network technician installed a SOHO router for a home office user. The user has read reports about home routers being targeted by malicious actors and then used in DDoS attacks. Which of the following can the technician MOST likely do to defend against this threat?A . Add network content...

March 1, 2025 No Comments READ MORE +

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before.

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the...

February 27, 2025 No Comments READ MORE +

Which of the following is a consequence of end-of-lite operating systems?

Which of the following is a consequence of end-of-lite operating systems?A . Operating systems void the hardware warranty.B . Operating systems cease to function.C . Operating systems no longer receive updates.D . Operating systems are unable to migrate data to the new operating system.View AnswerAnswer: C Explanation: End-of-life operating systems...

February 27, 2025 No Comments READ MORE +

Which of the following is the STRONGEST wireless configuration?

Which of the following is the STRONGEST wireless configuration?A . WPSB . WPA3C . WEPD . WMNView AnswerAnswer: B Explanation: The strongest wireless configuration is B. WPA3. WPA3 is the most up-to-date wireless encryption protocol and is the most secure choice. It replaces PSK with SAE, a more secure way...

February 24, 2025 No Comments READ MORE +