Which of the following will provide the ability to access these devices?

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?A . TelnetB . SSHC ....

August 18, 2022 No Comments READ MORE +

Which of the following would be the MOST effective method to accomplish this task?

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?A . DrillB . HammerC . Low-level formatD . DegaussingView...

August 18, 2022 No Comments READ MORE +

With which of the following types of infections are the PCs MOST likely infected?

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections...

August 18, 2022 No Comments READ MORE +

Which of the following will the administrator MOST likely use to log in to these servers?

An administrator created a connection to a private network using TLS 1.2. The Linux servers on the network do not support secure protocols. Which of the following will the administrator MOST likely use to log in to these servers?A . SSLB . RDPC . SSHD . TelnetView AnswerAnswer: D

August 18, 2022 No Comments READ MORE +

Which of the following types of social engineering threats is this?

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?A . PhishingB . Spear phishingC . Dumpster divingD . ImpersonationView AnswerAnswer: C

August 18, 2022 No Comments READ MORE +

In which of the following file extension types would a user expect to see the command. “net use T: serverfiles’?

In which of the following file extension types would a user expect to see the command. “net use T: serverfiles’?A . .batB . .vbsC . .jsD . .pyView AnswerAnswer: A

August 18, 2022 No Comments READ MORE +

Which of the following should the technician do to remove the threat from the system?

A user is trying to access a popular email website but is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue. Which of the following should the technician do to remove the threat from the system?A ....

August 17, 2022 No Comments READ MORE +

Which of the following best practices could have prevented the attack?

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack?A . Implementing strong passwordsB . Changing default credentialsC . Disabling AutoRunD...

August 17, 2022 No Comments READ MORE +

Which of the following is MOST likely the problem?

A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses. Which of the following is MOST likely the problem?A...

August 17, 2022 No Comments READ MORE +

Which of the following should be changed to resolve this issue?

A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following: Which of the following...

August 17, 2022 No Comments READ MORE +