Which of the following would BEST accomplish this goal?

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish...

September 30, 2020 No Comments READ MORE +

Which of the following types of social engineering threats is this?

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?A . PhishingB . Spear phishingC . Dumpster divingD . ImpersonationView AnswerAnswer: C

September 30, 2020 No Comments READ MORE +

Which of the following should a technician recommend?

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?A . Uninterruptible power supplyB . Surge protectorC . Power stripD . Power...

September 30, 2020 No Comments READ MORE +

Which of the following should the help desk perform to fix the issue?

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure. Which of the following should the help desk...

September 29, 2020 No Comments READ MORE +

Which of the following types of infection does the user MOST likely have?

A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have?A . RootkitB . KeyloggerC...

September 28, 2020 No Comments READ MORE +

Which of the following built-in utilities should be used?

A Mac user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?A . Time MachineB . SnapshotC . System RestoreD . Boot CampView AnswerAnswer:...

September 28, 2020 No Comments READ MORE +

Which of the following is considered government-regulated data?

Which of the following is considered government-regulated data?A . PHIB . End-user license agreementC . Digital Millennium Copyright ActD . DRMView AnswerAnswer: A

September 28, 2020 No Comments READ MORE +

Which of the following provide the BEST security for a server room? (Choose two.)

Which of the following provide the BEST security for a server room? (Choose two.)A . Badge readerB . BollardC . Biometric lockD . Cable lockE . USB tokenF . Privacy window shadesView AnswerAnswer: AB

September 28, 2020 No Comments READ MORE +

Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?A . Create a policy to...

September 28, 2020 No Comments READ MORE +

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Choose two.)

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Choose two.)A . UPSB . Server rackC . PoE phoneD . Desktop printerE . ModemF . Patch panelView AnswerAnswer: AB

September 28, 2020 No Comments READ MORE +