Which of the following would be the NEXT appropriate act?
A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP. Which of the following would be the NEXT appropriate act?A . Promptly notify the administrator’s immediate supervisorB . Rename the folder on the server, and notify...
A user has changed the MAC address of a laptop to gain access to a network.
A user has changed the MAC address of a laptop to gain access to a network. This is an instance of:A . spoofingB . brute forceC . man-in-the-middleD . a botnetView AnswerAnswer: A
Which of the following employs content filtering to prevent data leaks within an organization?
Which of the following employs content filtering to prevent data leaks within an organization?A . DLPB . IPSC . ACLD . VPNView AnswerAnswer: A
Which of the following will MOST likely resolve this issue?
A user is unable to get to any internal websites but can access some external websites. Which of the following will MOST likely resolve this issue?A . Uninstall and reinstall the browser.B . Confirm the proper proxy settingsC . Disable the firewallD . Disable and re-enable the network adapter.View AnswerAnswer:...
Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?
Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?A . Acceptable use policyB . Incident documentation policyC . Password compliance policyD . Change control policyView AnswerAnswer: A
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?A . 2GBB . 4GBC . 8GBD . 16GBView AnswerAnswer: B
Which of the following has MOST likely occurred?
Users have reported their files have disappeared, and they are unable to access local data. The security administrator quarantined all affected systems and removed any remote connectivity; however, users are still unable to access local data PC performance has not been affected, but the applications keep failing. Which of the...
Which of the following is the most likely NEXT step?
A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?A . Disable System Restore.B . Create a restore point.C . Apply system updates.D ....
Which of the following accurately describes why a file on a USB drive would be inaccessible by a user until the correct authentication is received?
Which of the following accurately describes why a file on a USB drive would be inaccessible by a user until the correct authentication is received?A . Read-only accessB . Secure BootC . System files and foldersD . BitLocker To GoView AnswerAnswer: D
Which of the following devices provides protection against brownouts?
Which of the following devices provides protection against brownouts?A . battery backupB . surge suppressorC . rack groundingD . line conditionerView AnswerAnswer: A