Which of the following should the systems administrator do?
A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account. Which of the following should the systems administrator do?A . Require the user to change the password at the next log-in....
Which of the following is the MOST likely next step in the change process?
A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?A . End user acceptance B. Perform risk analysis C. Communicate to stakeholders D. Sandbox testingView AnswerAnswer: D Explanation: The risk analysis should be performed before it's taken...
Which of the following is the BEST method to dispose of the drives?
A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?A . Drilling B. Degaussing C. Low-level formatting D. Erasing/wipingView AnswerAnswer: D Explanation: Erasing/wiping the hard drives is the best method to dispose of the...
Which of the following results should be expected?
The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?A . The contents of the text comptia.txt will be replaced with a new blank document B. The contents of the text comptia. txt would be displayed. C. The contents of the...
Which of the following should be checked FIRST?
A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?A . Services...
Which of the following BEST describes the security benefits realized after this deployment?
A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization. The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment? A. Multifactor authentication...
Which of the following does this process describe?
A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?A . Rights management B. Audit trail C. Chain of custody D. Data integrityView AnswerAnswer: C Explanation: The process of documenting who had possession of evidence at...
Which of the following will the incident handler MOST likely do to preserve the evidence?
An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?A . Encrypt the files B. Clone any impacted hard drives C. Contact the cyber insurance company D. Inform law enforcementView AnswerAnswer: B Explanation: The incident...
Which pf the following actions is the FIRST step the technician should take?
A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file extension. Which pf the following actions is the FIRST step the technician should take?A . Runa live disk clone. B. Run a...
A user reports a computer is running slow.
A user reports a computer is running slow. Which of the following tools will help a technician identity the issuedA . Disk Cleanup B. Group Policy Editor C. Disk Management D. Resource MonitorView AnswerAnswer: D Explanation: Resource Monitor will help a technician identify the issue when a user reports a...