Which of the following should be updated to reflect this new requirement?

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?A . MDM B. EULA C. IRP D. AUPView AnswerAnswer: D

November 9, 2022 No Comments READ MORE +

Which of the following filesystems will the technician MOST likely use?

A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?A . FAT32 B. ext4 C. NTFS D. exFATView AnswerAnswer: C

November 9, 2022 No Comments READ MORE +

Which of the following settings should the user change FIRST?

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?A . Encryption B. Wi-Fi channel C. Default passwords D. Service set identifierView AnswerAnswer: C

November 8, 2022 No Comments READ MORE +

Which of the following applications should the technician use to assist the user with hiding the file?

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?A . Device Manager B. Indexing Options C. File Explorer D. Administrative ToolsView...

November 8, 2022 No Comments READ MORE +

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?A . Acceptable use B. Chain of custody C. Security policy D. Information managementView AnswerAnswer: B

November 8, 2022 No Comments READ MORE +

Which of the following should a network administrator do to BEST prevent data theft within the call center?

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the...

November 6, 2022 No Comments READ MORE +

Which of the following would BEST limit the bark's risk?

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following...

November 6, 2022 No Comments READ MORE +

Which of the following has MOST likely occurred?

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds...

November 6, 2022 No Comments READ MORE +

Which of the following log-in options meets these requirements?

A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements?A . PIN B. Username and password C. SSO D. FingerprintView AnswerAnswer: A

November 6, 2022 No Comments READ MORE +

Which of the following technologies will allow a technician to see the issue along with the user?

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?A . RDP B. VNC C. SSH D. VPNView AnswerAnswer: B

November 6, 2022 No Comments READ MORE +