Which of the following authentication methods is being requested?

Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?A . Single-factorB . MultifactorC . RADIUSD . TACACSView AnswerAnswer: A

May 28, 2021 No Comments READ MORE +

Which of the following security concepts has the company just enabled?

A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?A . CertificatesB . Least privilegeC . Directory permissionsD . BlacklistsView AnswerAnswer: B

May 28, 2021 No Comments READ MORE +

Which of the following installation methods would the technician MOST likely use to accomplish this quickly?

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10. Which of the following installation methods would the technician MOST likely use to accomplish this quickly?A . Unattended installationB ....

May 28, 2021 No Comments READ MORE +

Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?

Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?A . Acceptable use policyB . Incident documentation policyC . Password compliance policyD . Change control policyView AnswerAnswer: A

May 28, 2021 No Comments READ MORE +

Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?A . Standard formattingB . HD drillingC . Low-level formattingD . HD partitioningView AnswerAnswer: C

May 28, 2021 No Comments READ MORE +

Which of the following Control Panel applets should a technician use to clear the cached invalid user login information?

A user is attempting to open Outlook, Outlook seems to have cached some invalid user login information, causing it to fail when trying to connect to Office 365 applications. Which of the following Control Panel applets should a technician use to clear the cached invalid user login information?A . Network...

May 27, 2021 No Comments READ MORE +

Which of the following was MOST likely the reason for this issue?

Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?A . Update limitationsB . Limited accessC . End-of-lifeD . Network connectionView AnswerAnswer: C

May 27, 2021 No Comments READ MORE +

Which of the following employs content filtering to prevent data leaks within an organization?

Which of the following employs content filtering to prevent data leaks within an organization?A . DLPB . IPSC . ACLD . VPNView AnswerAnswer: A

May 27, 2021 No Comments READ MORE +

Which of the following has the ability to allow or deny POP3 traffic on the firewall?

Which of the following has the ability to allow or deny POP3 traffic on the firewall?A . Email filteringB . MAC filteringC . Port securityD . Access control listView AnswerAnswer: D

May 27, 2021 No Comments READ MORE +

A Microsoft application will not open when a user clicks on it. Instead, the following error message pops up: This application has crashed. Would you like to send an error report to Microsoft?.

A Microsoft application will not open when a user clicks on it. Instead, the following error message pops up: This application has crashed. Would you like to send an error report to Microsoft?. Which of the following should the user try FIRSTA . Open the application with administrative privileges.B ....

May 27, 2021 No Comments READ MORE +