Which of the following should the technician perform FIRST to mitigate the issue?

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate...

March 27, 2023 No Comments READ MORE +

Which of the following backup methods would BEST meet the requirements?

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?A ....

March 27, 2023 No Comments READ MORE +

Which of the following actions should the technician do FIRST?

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?A . Lock all devices in a closet. B. Ensure all devices are from the same manufacturer....

March 27, 2023 No Comments READ MORE +

Which of the following should the administrator do to help secure the device against this threat in the future?

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).A . Prevent a...

March 27, 2023 No Comments READ MORE +

Which of the following tools would the technician MOST likely use to safely make this change?

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely...

March 27, 2023 No Comments READ MORE +

Which of the following applications should the technician use to assist the user with hiding the file?

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?A . Device Manager B. Indexing Options C. File Explorer D. Administrative ToolsView...

March 27, 2023 No Comments READ MORE +

Which of the following should the technician implement?

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?A . WPS B. TKIP C. WPA3 D. WEPView AnswerAnswer: C Explanation: WPA3 (Wi-Fi Protected Access version 3) is the latest version of Wi-Fi security and...

March 25, 2023 No Comments READ MORE +

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?A . Acceptable use B. Chain of custody C. Security policy D. Information managementView AnswerAnswer: B Explanation: The aspect of forensic evidence life cycle that must be maintained when dealing with...

March 25, 2023 No Comments READ MORE +

Which of the following should the technician implement?

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?A . MSRA B. VNC C. VPN D. SSHView AnswerAnswer: C Explanation: A technician needs to interconnect two offices to the main branch while...

March 25, 2023 No Comments READ MORE +

Which of the following attacks MOST likely occurred?

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute force B. Zero day C. Denial of service D. On-pathView AnswerAnswer: B Explanation: A zero-day attack...

March 25, 2023 No Comments READ MORE +