Which of the following tools would the technician MOST likely use to safely make this change?
A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely...
Which of the following applications should the technician use to assist the user with hiding the file?
A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?A . Device Manager B. Indexing Options C. File Explorer D. Administrative ToolsView...
Which of the following should the technician implement?
A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?A . WPS B. TKIP C. WPA3 D. WEPView AnswerAnswer: C Explanation: WPA3 (Wi-Fi Protected Access version 3) is the latest version of Wi-Fi security and...
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?A . Acceptable use B. Chain of custody C. Security policy D. Information managementView AnswerAnswer: B Explanation: The aspect of forensic evidence life cycle that must be maintained when dealing with...
Which of the following should the technician implement?
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?A . MSRA B. VNC C. VPN D. SSHView AnswerAnswer: C Explanation: A technician needs to interconnect two offices to the main branch while...
Which of the following attacks MOST likely occurred?
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute force B. Zero day C. Denial of service D. On-pathView AnswerAnswer: B Explanation: A zero-day attack...
Which of the following is the BEST security practice for this scenario?
A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?A . PIN-based login B. Quarterly password changes C. Hard drive encryption D. A physical laptop lockView AnswerAnswer: C Explanation: Encrypting the laptop's hard drive will...
Which of the following filesystems will the technician MOST likely use?
A technician needs lo formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?A . FAT32 B. ext4 C. NTFS D. exFATView AnswerAnswer: C Explanation: Since Windows systems support FAT32 and NTFS...
Which of the following should the systems administrator do?
A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account. Which of the following should the systems administrator do?A . Require the user to change the password at the next log-in....
Which of the following is the MOST likely next step in the change process?
A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?A . End user acceptance B. Perform risk analysis C. Communicate to stakeholders D. Sandbox testingView AnswerAnswer: D Explanation: The risk analysis should be performed before it's taken...