Which of the following backup methods would BEST address these concerns?

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?A . Full B. Differential C. Off-site D. Grandfather-father-sonView AnswerAnswer: B Explanation: The...

August 27, 2023 No Comments READ MORE +

Which of the following technologies can be implemented to prevent this issue?

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?A . Signed system images B. Antivirus C. SSO D. MDMView AnswerAnswer: D Explanation: MDM stands for...

August 27, 2023 No Comments READ MORE +

Which of the following describes this incident?

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . Pretexting B. Spoofing C. Vishing D. ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...

August 26, 2023 No Comments READ MORE +

Which of the following should a technician do to allow access?

A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?A . Adjust the content filtering. B. Unmap port forwarding. C. Disable unused ports. D. Reduce the encryption strengthView AnswerAnswer: A Explanation: Content filtering is a process that manages...

August 26, 2023 No Comments READ MORE +

Which of the following configurations should the technician employ to achieve this goal?

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?A . Configure the network as private B. Enable...

August 26, 2023 No Comments READ MORE +

Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...

August 26, 2023 No Comments READ MORE +

Which of the following is causing the login issue?

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?A...

August 26, 2023 No Comments READ MORE +

Which of the following should the technician implement?

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?A . MSRA B. VNC C. VPN D. SSHView AnswerAnswer: C Explanation: A technician needs to interconnect two offices to the main branch while...

August 26, 2023 No Comments READ MORE +

Which of the following would MOST likely solve the issue?

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue? A. Updating the operating system B. Changing proxy settings C. Reinstalling the...

August 25, 2023 No Comments READ MORE +

Which of the following should the administrator do to help secure the device against this threat in the future?

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO). A. Prevent a...

August 25, 2023 No Comments READ MORE +