Which of the following encryption technologies should be used to secure the workstation in case of theft?
A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?A . Data-in-transit encryptionB . File encryptionC ....
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?A . Acceptable useB . Chain of custodyC . Security policyD . Information managementView AnswerAnswer: B
Which of the following types of backups should be completed FIRST?
A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?A . FullB . Non-parityC . DifferentialD . IncrementalView AnswerAnswer: A
A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?
A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?A . Encrypting File SystemB . FileVaultC . BitLockerD . Encrypted LVMView AnswerAnswer: A
Which of the following would BEST limit the bark's risk?
The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following...
Which of the following features BEST addresses the user's concern?
A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?A . Remote wipeB . Anti-maIwareC . Device encryptionD ....
Which of the following should be updated before requesting approval again?
A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?A . Scope of changeB . Risk levelC . Rollback planD . End user acceptanceView AnswerAnswer: C
Which of the followings tools should the technician use to accomplish this task?
A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?A . ConsoltfB . Disk UtilityC . Time MachineD . FileVaultView AnswerAnswer: B
Which of the following describes this incident?
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . PretextingB . SpoofingC . VishingD . ScarewareView AnswerAnswer: C
Which of the following would be the BEST way to secure the current workflow?
A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following...