Which of the following should the technician configure?
A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?A . WPA2 with TKIP B. WPA2 with AES C. WPA3withAES-256 D. WPA3 with AES-128View AnswerAnswer: B...
During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:
During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the...
Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).
Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).A . .mac B. .Pkg C. .deb D. .dmg E. .msi F. .appx G. .app H. .apkView AnswerAnswer: B,D,G Explanation: https://support.microsoft.com/en-us/windows/common-file-name-extensions-in-windows-da4a4430-8e76-89c5-59f7-1cdbbc75cb01.pkg and .dmg are files used to distribute and install applications on macOS....
Which of the following social-engineering attacks is being attempted?
While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?A . Evil twin B. Impersonation C. Insider threat D. WhalingView AnswerAnswer: A Explanation: An evil twin is a...
Which of the following should the technician perform FIRST?
After clicking on a link in an email a Chief Financial Officer (CFO) received the following error: The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?A . Update the browser's CRLs B. File...
Which of the following files should the technician execute in order to complete the installation?
A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?A . Installer_x64.exe B. Installer_Files.zip C. Installer_32.msi D. Installer_x86.exe E. Installer_Win10Enterprise.dmgView AnswerAnswer: D...
Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?
An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?A . RDP through RD Gateway B. Apple Remote Desktop C. SSH access with SSH keys D....
Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...
Which of the following should be updated to reflect this new requirement?
A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?A . MDM B. EULA C. IRP D. AUPView AnswerAnswer: D Explanation: AUP (Acceptable Use Policy)...
Which of the following would BEST accomplish this task?
A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?A . Differential backup B. Off-site backup C. Incremental backup D. Full backupView AnswerAnswer: D Explanation: To accomplish this task, the technician...