Which of the following is the MOST effective way to check other machines on the network for this unknown threat?
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the...
dealing with this Issue?
A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?A . Adjusting...
Which of the following BEST addresses this need?
A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?A . Guards B. Bollards C. Motion sensors D. Access control vestibuleView AnswerAnswer: B Explanation: Bollards are the...
Which of the following backup methods should the technician MOST likely implement?
A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which...
Which of the following BEST describes the purpose of this string?
Upon downloading a new ISO, an administrator is presented with the following string: 59d15a16ce90cBcc97fa7c211b767aB Which of the following BEST describes the purpose of this string?A . XSS verification B. AES-256 verification C. Hash verification D. Digital signature verificationView AnswerAnswer: C Explanation: Hash verification is a process that verifies the integrity...
Which of the following describes this incident?
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . Pretexting B. Spoofing C. Vishing D. ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...
Which of the following is causing the login issue?
A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?A...
Which of the following tools should the technician use to make adjustments?
A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the...
Which of the following BEST describes the technician's actions?
A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?A . Avoid distractions B. Deal appropriately with customer's confidential material . C. Adhere to user privacy...
Which of the following actions should the technician do FIRST?
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?A . Lock all devices in a closet. B. Ensure all devices are from the same manufacturer....