Which of the following describes this incident?

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . Pretexting B. Spoofing C. Vishing D. ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...

August 26, 2023 No Comments READ MORE +

Which of the following should a technician do to allow access?

A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?A . Adjust the content filtering. B. Unmap port forwarding. C. Disable unused ports. D. Reduce the encryption strengthView AnswerAnswer: A Explanation: Content filtering is a process that manages...

August 26, 2023 No Comments READ MORE +

Which of the following configurations should the technician employ to achieve this goal?

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?A . Configure the network as private B. Enable...

August 26, 2023 No Comments READ MORE +

Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...

August 26, 2023 No Comments READ MORE +

Which of the following is causing the login issue?

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?A...

August 26, 2023 No Comments READ MORE +

Which of the following should the technician implement?

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?A . MSRA B. VNC C. VPN D. SSHView AnswerAnswer: C Explanation: A technician needs to interconnect two offices to the main branch while...

August 26, 2023 No Comments READ MORE +

Which of the following would MOST likely solve the issue?

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue? A. Updating the operating system B. Changing proxy settings C. Reinstalling the...

August 25, 2023 No Comments READ MORE +

Which of the following should the administrator do to help secure the device against this threat in the future?

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO). A. Prevent a...

August 25, 2023 No Comments READ MORE +

Which of the following should a technician adjust to resolve the issue?

A Windows user recently replaced a computer The user can access the public internet on the computer; however, an internal site at https7/companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?A . Default gateway settings B. DHCP settings C. IP address settings...

August 25, 2023 No Comments READ MORE +

Which of the following can the technician MOST likely do to defend against this threat?

A network technician installed a SOHO router for a home office user. The user has read reports about home routers being targeted by malicious actors and then used in DDoS attacks. Which of the following can the technician MOST likely do to defend against this threat?A . Add network content...

August 25, 2023 No Comments READ MORE +