Which of the following is the MOST effective method to accomplish this task?

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?A . Degaussing B. Low-level formatting C. Recycling D. ShreddingView AnswerAnswer: D Explanation: Shredding is the most effective method to securely dispose of data stored on...

May 16, 2023 No Comments READ MORE +

Which of the following change management documents includes how to uninstall a patch?

Which of the following change management documents includes how to uninstall a patch?A . Purpose of change B. Rollback plan C. Scope of change D. Risk analysisView AnswerAnswer: B Explanation: The change management document that includes how to uninstall a patch is called the “rollback plan”. The rollback plan is...

May 16, 2023 No Comments READ MORE +

Which of the following steps would MOST likely resolve the issue?

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives...

May 16, 2023 No Comments READ MORE +

Which of the following describes this incident?

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . Pretexting B. Spoofing C. Vishing D. ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...

May 16, 2023 No Comments READ MORE +

Which of the following is the BEST method to use for the physical destruction of SSDs?

A data center is required to destroy SSDs that contain sensitive information. Which of the following is the BEST method to use for the physical destruction of SSDs?A . Wiping B. Low-level formatting C. Shredding D. ErasingView AnswerAnswer: C Explanation: Shredding is the best method to use for the physical...

May 15, 2023 No Comments READ MORE +

Which of the following is an example of MFA?

Which of the following is an example of MFA?A . Fingerprint scan and retina scan B. Password and PIN C. Username and password D. Smart card and passwordView AnswerAnswer: D Explanation: Smart card and password is an example of two-factor authentication (2FA), not multi-factor authentication (MFA). MFA requires two or...

May 15, 2023 No Comments READ MORE +

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?A . Home B. Pro for Workstations C. Enterprise D. ProView AnswerAnswer: D Explanation: The most cost-effective version of Windows 10 that allows remote access through Remote Desktop is Windows 10 Pro....

May 15, 2023 No Comments READ MORE +

Which of the following should the user do to resolve the issue?

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the...

May 15, 2023 No Comments READ MORE +

Which of the following tools can be used?

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?A . afc B. ehkdsk C. git clone D. zobocopyView AnswerAnswer: A Explanation: The technician...

May 15, 2023 No Comments READ MORE +

Which of the following should be updated before requesting approval again?

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?A . Scope of change B. Risk level C. Rollback plan D. End user acceptanceView AnswerAnswer: C Explanation: The rollback...

May 15, 2023 No Comments READ MORE +