Which of the following is a data security standard for protecting credit cards?

Which of the following is a data security standard for protecting credit cards?A . PHI B. NIST C. PCI D. GDPRView AnswerAnswer: C Explanation: The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or...

August 21, 2023 No Comments READ MORE +

Which of the following should a support technician check FIRST?

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?A . User account status B. Mobile OS version C. Data plan coverage D....

August 21, 2023 No Comments READ MORE +

Which of the following BEST addresses this need?

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?A . Guards B. Bollards C. Motion sensors D. Access control vestibuleView AnswerAnswer: B Explanation: Bollards are the...

August 21, 2023 No Comments READ MORE +

Which of the following steps should the technician take NEXT?

A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which of the following steps should the technician take NEXT?A . Quarantine the computer. B. use a previous restore point, C. Educate the end user about viruses D. Download the latest...

August 21, 2023 No Comments READ MORE +

Which of the following should the technician implement?

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?A . WPS B. TKIP C. WPA3 D. WEPView AnswerAnswer: C Explanation: WPA3 (Wi-Fi Protected Access version 3) is the latest version of Wi-Fi security and...

August 21, 2023 No Comments READ MORE +

Which of the following is MOST likely the cause of this issue?

While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST...

August 21, 2023 No Comments READ MORE +

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?A . Remote Assistance B. Remote Desktop Protocol C. Screen Sharing D. Virtual Network ComputingView AnswerAnswer: C Explanation: Screen Sharing is the default system tool that can...

August 21, 2023 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting...

August 20, 2023 No Comments READ MORE +

Which of the following features BEST addresses the user's concern?

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern? A. Remote wipe B. Anti-maIware C. Device encryption D....

August 20, 2023 No Comments READ MORE +

Which of the following is MOST likely contained in an EULA?

Which of the following is MOST likely contained in an EULA?A . Chain of custody B. Backup of software code C. Personally identifiable information D. Restrictions of useView AnswerAnswer: D Explanation: An EULA (End-User License Agreement) is a legally binding contract between a software supplier and a customer or end-user,...

August 20, 2023 No Comments READ MORE +