Which of the following BEST describes the purpose of this string?
Upon downloading a new ISO, an administrator is presented with the following string: 59d15a16ce90cBcc97fa7c211b767aB Which of the following BEST describes the purpose of this string?A . XSS verification B. AES-256 verification C. Hash verification D. Digital signature verificationView AnswerAnswer: C Explanation: Hash verification is a process that verifies the integrity...
Which of the following describes this incident?
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . Pretexting B. Spoofing C. Vishing D. ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...
Which of the following is causing the login issue?
A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?A...
Which of the following tools should the technician use to make adjustments?
A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the...
Which of the following BEST describes the technician's actions?
A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?A . Avoid distractions B. Deal appropriately with customer's confidential material . C. Adhere to user privacy...
Which of the following actions should the technician do FIRST?
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?A . Lock all devices in a closet. B. Ensure all devices are from the same manufacturer....
Which of the following is the MOST effective method to accomplish this task?
A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?A . Degaussing B. Low-level formatting C. Recycling D. ShreddingView AnswerAnswer: D Explanation: Shredding is the most effective method to securely dispose of data stored on...
Which of the following should a technician investigate NEXT to resolve the issue?
A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?A . Enable firewall ACLs. B. Examine the localhost file entries. C. Verify...
Which of the following troubleshooting steps should the user perform FIRST?
A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?A . Delete the application's cache. B. Check for application updates. C. Roll back the OS update. D. Uninstall and...
Which of the following practices should the technician use to make sure the ticket is associated with the correct user?
When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user? A. Have the user provide a callback phone number to be added...