Which of the following security measures should be used?
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used?A . Biometric deviceB . Common access...
Which of the following would be the MOST appropriate solution to protect the office computers?
An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers?A . Uninterruptible power supplyB . Voltage regulatorC . Surge suppressorD . GeneratorView AnswerAnswer: A
Which of the following should the technician implement to ensure maximum uptime of the client VM?
A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs. Which of the following should the technician implement to ensure maximum uptime...
Which of the following should a technician perform to identify and resolve the issue?
A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose two.)A . Run...
Which of the following BEST describes this email?
The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?A...
Which of the following is the BEST method for the technician to use to scan the boot sector?
A technician is working on an infected computer that is currently turned off. The technician is concerned the boot sector is affected. Which of the following is the BEST method for the technician to use to scan the boot sector?A . Mount the drive using a forensic platformB . Boot...
Which of the following would BEST support an 8TB hard drive with one partition?
Which of the following would BEST support an 8TB hard drive with one partition?A . GPTB . FAT16C . FAT32D . EFSView AnswerAnswer: A
Which of the following actions should the technician take?
A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?A . Continue to work on the assigned taskB . Take...
Users notify the help desk of an email that was just received. The email came from the help desk’s email address and asked the users to click on an embedded link.
Users notify the help desk of an email that was just received. The email came from the help desk’s email address and asked the users to click on an embedded link. This email is BEST described as:A . phishing.B . zombie.C . whaling.D . spoofing.View AnswerAnswer: D
Which of the following types of scripts would be seen on the user end of a web page?
Which of the following types of scripts would be seen on the user end of a web page?A . .batB . .jsC . .shD . .vbsView AnswerAnswer: D