Which of the following is the STRONGEST wireless configuration?
Which of the following is the STRONGEST wireless configuration?A . WPSB . WPA3C . WEPD . WMNView AnswerAnswer: B Explanation: The strongest wireless configuration is B. WPA3. WPA3 is the most up-to-date wireless encryption protocol and is the most secure choice. It replaces PSK with SAE, a more secure way...
Which of the following is the BEST way the officer can secure the workstation quickly when walking away?
A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?A . Use a key combination to lock the computer when leaving.B . Ensure no unauthorized personnel are in the...
Which of the following filesystems is supported by both OS types?
A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?A . NTFSB . APFSC . ext4D . exFATView AnswerAnswer: D Explanation: The filesystem that is supported...
Which of the following Linux commands would be used to install an application?
Which of the following Linux commands would be used to install an application? A. yum B. grep C. Is D. sudoView AnswerAnswer: A Explanation: A. yum - "yum" stands for "Yellowdog Updater, Modified." It's a command-line package management utility for computers running the Linux operating system using the RPM Package...
Which of the following BEST describes why the system still has malware?
A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected....
Which of the following describes what the technician should do?
A call center technician receives a call from a user asking how to update Windows. Which of the following describes what the technician should do?A . Have the user consider using an iPad if the user is unable to complete updatesB . Have the user text the user's password to...
Which of the following features BEST addresses the user's concern?
A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern? A. Remote wipe B. Anti-maIware C. Device encryption D....
Which of the following is a data security standard for protecting credit cards?
Which of the following is a data security standard for protecting credit cards?A . PHIB . NISTC . PCID . GDPRView AnswerAnswer: C Explanation: The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or...
Which of the following file types are supported by default?
A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?A . .pyB . .jsC . .vbsD . .shView AnswerAnswer: D Explanation: https://www.educba.com/shell-scripting-in-linux/
Which of the following is a consequence of end-of-lite operating systems?
Which of the following is a consequence of end-of-lite operating systems?A . Operating systems void the hardware warranty.B . Operating systems cease to function.C . Operating systems no longer receive updates.D . Operating systems are unable to migrate data to the new operating system.View AnswerAnswer: C Explanation: End-of-life operating systems...