Which of the following technologies should be implemented to mitigate this risk?
A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).A . Remote wipe B. Firewall C. Device encryption D. Remote backup E. Antivirus F. Global Positioning SystemView AnswerAnswer: A,C Explanation: Remote wipe is...
Which of the following BEST addresses this need?
A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?A . Guards B. Bollards C. Motion sensors D. Access control vestibuleView AnswerAnswer: B Explanation: Bollards are the...
Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?
A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings...
Which of the following filesystems is supported by both OS types?
A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?A . NTFS B. APFS C. ext4 D. exFATView AnswerAnswer: D Explanation: The filesystem that is supported...
Which of the following macOS features provides the user with a high-level view of all open windows?
Which of the following macOS features provides the user with a high-level view of all open windows?A . Mission Control B. Finder C. Multiple Desktops D. SpotlightView AnswerAnswer: A Explanation: Mission Control is the macOS feature that provides the user with a high-level view of all open windows. Mission Control...
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?A . Acceptable use B. Chain of custody C. Security policy D. Information managementView AnswerAnswer: B Explanation: The aspect of forensic evidence life cycle that must be maintained when dealing with...
Which of the following options describes how to set up Windows Hello Fingerprint for the user?
A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up...
Which of the following should the technician use to mitigate this issue?
A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?A . Surge suppressor B. Battery backup C. CMOS battery...
Which of the following should the technician use?
A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use?A . DHCP reservation B. Port forwarding C. DNS A record D....
Which of the following BEST describes the purpose of this string?
Upon downloading a new ISO, an administrator is presented with the following string: 59d15a16ce90cBcc97fa7c211b767aB Which of the following BEST describes the purpose of this string?A . XSS verification B. AES-256 verification C. Hash verification D. Digital signature verificationView AnswerAnswer: C Explanation: Hash verification is a process that verifies the integrity...