Which of the following would BEST mitigate this threat?
The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?A . Encryption at rest B. Account lockout C. Automatic screen lock D. AntivirusView AnswerAnswer: B Explanation:...
Which of the following would BEST accomplish this task?
A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?A . Differential backup B. Off-site backup C. Incremental backup D. Full backupView AnswerAnswer: D Explanation: To accomplish this task, the technician...
Which of the following methods should the technician use to refresh the laptop?
A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?A . Internet-based upgrade B. Repair installation C. Clean install D. USB repair E. In place upgradeView AnswerAnswer: C Explanation: The desktop...
A user received the following error upon visiting a banking website:
A user received the following error upon visiting a banking website: The security presented by website was issued a different website' s address. A technician should instruct the user to:A . clear the browser cache and contact the bank. B. close out of the site and contact the bank. C....
A user wants to set up speech recognition on a PC In which of the following Windows Settings tools can the user enable this option?
A user wants to set up speech recognition on a PC In which of the following Windows Settings tools can the user enable this option?A . Language B. System C. Personalization D. Ease of AccessView AnswerAnswer: D Explanation: The user can enable speech recognition on a PC in the Ease...
Which of the following BEST describes the purpose of this string?
Upon downloading a new ISO, an administrator is presented with the following string: 59d15a16ce90cBcc97fa7c211b767aB Which of the following BEST describes the purpose of this string?A . XSS verification B. AES-256 verification C. Hash verification D. Digital signature verificationView AnswerAnswer: C Explanation: Hash verification is a process that verifies the integrity...
Which of the following only has a web browser interface?
Which of the following only has a web browser interface?A . Linux B. Microsoft Windows C. iOS D. ChromiumView AnswerAnswer: D Explanation: Chromium is an operating system that only has a web browser interface. Chromium is an open-source project that provides the source code and framework for Chrome OS, which...
Which of the following steps should the technician take?
A technician is installing a program from an ISO file. Which of the following steps should the technician take?A . Mount the ISO and run the installation file. B. Copy the ISO and execute on the server. C. Copy the ISO file to a backup location and run the ISO...
Which of the following should a technician investigate NEXT to resolve the issue?
A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?A . Enable firewall ACLs. B. Examine the localhost file entries. C. Verify...
Which of the following describes what the technician should do?
A call center technician receives a call from a user asking how to update Windows. Which of the following describes what the technician should do?A . Have the user consider using an iPad if the user is unable to complete updates B. Have the user text the user's password to...