Which of the following would be considered the BEST method of securely distributing medical records?

Which of the following would be considered the BEST method of securely distributing medical records?A . Encrypted flash driveB . Social networking sitesC . FaxD . FTP file sharingView AnswerAnswer: A Explanation: An encrypted flash drive would be the best method of securely distributing medical records among the given options....

February 22, 2025 No Comments READ MORE +

Which of the following security concerns is a threat to confidentiality?

Which of the following security concerns is a threat to confidentiality?A . Replay attackB . Denial of serviceC . Service outageD . Dumpster divingView AnswerAnswer: D Explanation: Dumpster diving is a technique used by attackers to obtain sensitive information from discarded documents, such as passwords, account numbers, or personal details....

February 21, 2025 No Comments READ MORE +

following would be the BEST choice to accomplish this task?

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?A . Thunderbolt cableB . Bluetooth moduleC . Infrared portD . WLAN cardView AnswerAnswer: D Explanation: A WLAN card would be...

February 20, 2025 No Comments READ MORE +

Which of the following should the technician do FIRST?

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?A . Check Knowledge Base.B . Search local logs.C . Research possible theories.D . No. of users.View AnswerAnswer: A Explanation: A...

February 19, 2025 No Comments READ MORE +

Which of the following is an example of multifactor authentication?

Which of the following is an example of multifactor authentication?A . Password and passphraseB . Fingerprint and retina scanC . Hardware token and smartphoneD . Smart card and PINView AnswerAnswer: D Explanation: Smart card and PIN are the examples of multifactor authentication. Multifactor authentication is a security method that requires...

February 19, 2025 No Comments READ MORE +

Which of the following should the technician select?

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?A . 802.11aB . 802.11bC . 802.11gD . 802.11nView AnswerAnswer: B Explanation:

February 18, 2025 No Comments READ MORE +

Which of the following best describes the technician’s NEXT step?

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?A . Restart the computer.B . Contact other users.C . Disconnect the peripherals.D . Document the findings.View AnswerAnswer: D Explanation: The...

February 17, 2025 No Comments READ MORE +

Which of the following concepts is this an example of?

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?A . Non-repudiationB . AuthenticationC . IntegrityD . AccountingView AnswerAnswer: A Explanation: Non-repudiation is a security...

February 14, 2025 No Comments READ MORE +

A programmer uses DML to modify:

A programmer uses DML to modify:A . filesB . permissionsC . dataD . backupsView AnswerAnswer: C Explanation: A programmer uses DML to modify data in a database. DML stands for Data Manipulation Language, which is a subset of SQL (Structured Query Language) that is used to manipulate or change data...

February 14, 2025 No Comments READ MORE +

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?A . Rule-based access controlB . Mandatory access controlC . Role-based access controlD . Discretionary access controlView AnswerAnswer: C Explanation: Role-based access control is the authorization technique that is used...

February 12, 2025 No Comments READ MORE +