A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?
A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?A . Encrypting File SystemB . FileVaultC . BitLockerD . Encrypted LVMView AnswerAnswer: A
Which of the following would BEST limit the bark's risk?
The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following...
Which of the following features BEST addresses the user's concern?
A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?A . Remote wipeB . Anti-maIwareC . Device encryptionD ....
Which of the following should be updated before requesting approval again?
A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?A . Scope of changeB . Risk levelC . Rollback planD . End user acceptanceView AnswerAnswer: C
Which of the followings tools should the technician use to accomplish this task?
A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?A . ConsoltfB . Disk UtilityC . Time MachineD . FileVaultView AnswerAnswer: B
Which of the following describes this incident?
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . PretextingB . SpoofingC . VishingD . ScarewareView AnswerAnswer: C
Which of the following would be the BEST way to secure the current workflow?
A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following...
Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?
A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?A . Default gatewayB . Host addressC . Name serverD . Subnet maskView...
Which of the following is the FIRST step in troubleshooting?
A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?A . Install alternate open-source software in place of the applications...
Which of the following should the technician perform?
A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?A . Change the DNS address to 1.1.1.1B . Update Group PolicyC . Add the...