Which of the following should the technician do FIRST?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before . Which of the following should the technician do FIRST?A . Check Knowledge Base.B . Search local logs.C . Research possible theories.D . QUESTION NO: users.View AnswerAnswer: A
Which of the following is an example of multifactor authentication?
Which of the following is an example of multifactor authentication?A . Password and passphraseB . Fingerprint and retina scanC . Hardware token and smartphoneD . Smart card and PINView AnswerAnswer: D
Which of the following business continuity concepts does this explain?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss . Which of the following business continuity concepts does this explain?A . File backupB . Data restorationC . Fault toleranceD...
Which of the following concepts is this an example of?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?A . Non-repudiationB . AuthenticationC . IntegrityD . AccountingView AnswerAnswer: B
Which of the following should be set up to accomplish this?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?A . EncryptionB...
Which of the following relational database constructs is used to ensure valid values are entered for a column?
Which of the following relational database constructs is used to ensure valid values are entered for a column?A . SchemaB . PermissionsC . ConstraintD . ColumnView AnswerAnswer: C
Which of the following should the developer use to BEST protect the document?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?A...
remotely?
A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?A . The quality of the computer used to connectB . A security...
Which of the following security concerns is a threat to confidentiality?
Which of the following security concerns is a threat to confidentiality?A . Replay attackB . Denial of serviceC . Service outageD . Dumpster divingView AnswerAnswer: A
Which of the following should the user do to correct this issue?
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?A . Ensure both devices are connected to the LAC . Enable task scheduling.D . Reset...