Which of the following can BEST resolve the interference?
A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?A . Changing channels B. Modifying the wireless security C. Disabling the SSIO broadcast D. Changing the access point nameView AnswerAnswer: A
Which of the following will the incident handler MOST likely do to preserve the evidence?
An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?A . Encrypt the files B. Clone any impacted hard drives C. Contact the cyber insurance company D. Inform law enforcementView AnswerAnswer: B
Which of the following is the MOST effective method to accomplish this task?
A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?A . Degaussing B. Low-level formatting C. Recycling D. ShreddingView AnswerAnswer: D
Which of the following steps should the technician take NEXT?
A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?A . Continue researching the issue B. Repeat the iterative processes C. Inform...
Which of the following encryption technologies should be used to secure the workstation in case of theft?
A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?A . Data-in-transit encryption B. File encryption C....
Which of the following tools will help a technician identity the issued?
A user reports a computer is running slow. Which of the following tools will help a technician identity the issued?A . Disk Cleanup B. Group Policy Editor C. Disk Management D. Resource MonitorView AnswerAnswer: D
Which of the following steps should the systems administrator most likely attempt NEXT?
A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?A ....
Which of the following could be used to implement secure physical access to a data center?
Which of the following could be used to implement secure physical access to a data center?A . Geofence B. Alarm system C. Badge reader D. Motion sensorView AnswerAnswer: A
Which of the following tools can be used?
A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?A . afc B. ehkdsk C. git clone D. zobocopyView AnswerAnswer: A
Which of the following explains why the OS can only access 46B of RAM?
A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?A . The UEFI...