Which of the following does this process describe?
A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?A . Rights management B. Audit trail C. Chain of custody D. Data integrityView AnswerAnswer: C
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?A . Home B. Pro for Workstations C. Enterprise D. ProView AnswerAnswer: D
Which of the following types of backups should be completed FIRST?
A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?A . Full B. Non-parity C. Differential D. IncrementalView AnswerAnswer: A
Which of the following has infected the computer?
A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?A . Cryptominer B....
Which of the following is MOST likely to be of concern to the IT manager?
An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?A . All updated software must be...
Which of the following Wi-Fi protocols is the MOST secure?
Which of the following Wi-Fi protocols is the MOST secure?A . WPA3 B. WPA-AES C. WEP D. WPA-TKIPView AnswerAnswer: A
Which of the following tools will help a technician identity the issued?
A user reports a computer is running slow. Which of the following tools will help a technician identity the issued?A . Disk Cleanup B. Group Policy Editor C. Disk Management D. Resource MonitorView AnswerAnswer: D
Which of the following BEST describes the technician's actions?
A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent . Which of the following BEST describes the technician's actions?A . Avoid distractions B. Deal appropriately with customer's confidential material C. Adhere to user privacy...
Which of the following attacks MOST likely occurred?
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet . Which of the following attacks MOST likely occurred?A . Brute force B. Zero day C. Denial of service D. On-pathView AnswerAnswer: B
Which of the following features BEST addresses the user's concern?
A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device . Which of the following features BEST addresses the user's concern?A . Remote wipe B. Anti-maIware C. Device encryption...