Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?A . RDP through RD Gateway B. Apple Remote Desktop C. SSH access with SSH keys D....

May 18, 2023 No Comments READ MORE +

Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...

May 18, 2023 No Comments READ MORE +

Which of the following should be updated to reflect this new requirement?

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?A . MDM B. EULA C. IRP D. AUPView AnswerAnswer: D Explanation: AUP (Acceptable Use Policy)...

May 17, 2023 No Comments READ MORE +

Which of the following would BEST accomplish this task?

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?A . Differential backup B. Off-site backup C. Incremental backup D. Full backupView AnswerAnswer: D Explanation: To accomplish this task, the technician...

May 17, 2023 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?A . Private-browsing mode B. Invalid certificate C....

May 17, 2023 No Comments READ MORE +

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?A . Acceptable use B. Chain of custody C. Security policy D. Information managementView AnswerAnswer: B Explanation: The aspect of forensic evidence life cycle that must be maintained when dealing with...

May 17, 2023 No Comments READ MORE +

Which of the following command-line tools will delete a directory?

Which of the following command-line tools will delete a directory?A . md B. del C. dir D. rd E. cdView AnswerAnswer: D Explanation: To delete an empty directory, enter rd Directory or rmdir Directory . If the directory is not empty, you can remove files and subdirectories from it using...

May 17, 2023 No Comments READ MORE +

for parallel execution of the Linux application and Windows applications?

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows...

May 17, 2023 No Comments READ MORE +

Which of the following utilities should be used?

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?A . Privacy B. Indexing Options C. System D. Device ManagerView AnswerAnswer: B Explanation: To exclude an application folder from being cataloged by a Windows 10 search,...

May 17, 2023 No Comments READ MORE +

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before.

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the...

May 17, 2023 No Comments READ MORE +