Which of the following is the MOST likely cause of the issue?

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?A . Private-browsing mode B. Invalid certificate C....

May 17, 2023 No Comments READ MORE +

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?A . Acceptable use B. Chain of custody C. Security policy D. Information managementView AnswerAnswer: B Explanation: The aspect of forensic evidence life cycle that must be maintained when dealing with...

May 17, 2023 No Comments READ MORE +

Which of the following command-line tools will delete a directory?

Which of the following command-line tools will delete a directory?A . md B. del C. dir D. rd E. cdView AnswerAnswer: D Explanation: To delete an empty directory, enter rd Directory or rmdir Directory . If the directory is not empty, you can remove files and subdirectories from it using...

May 17, 2023 No Comments READ MORE +

for parallel execution of the Linux application and Windows applications?

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows...

May 17, 2023 No Comments READ MORE +

Which of the following utilities should be used?

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?A . Privacy B. Indexing Options C. System D. Device ManagerView AnswerAnswer: B Explanation: To exclude an application folder from being cataloged by a Windows 10 search,...

May 17, 2023 No Comments READ MORE +

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before.

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the...

May 17, 2023 No Comments READ MORE +

Which of the following should the technician configure?

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?A . WPA2 with TKIP B. WPA2 with AES C. WPA3withAES-256 D. WPA3 with AES-128View AnswerAnswer: B...

May 17, 2023 No Comments READ MORE +

Which of the followings tools should the technician use to accomplish this task?

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?A . Consoltf B. Disk Utility C. Time Machine D. FileVaultView AnswerAnswer: B Explanation: The technician should use Disk Utility...

May 17, 2023 No Comments READ MORE +

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?A . gpedit B. gpmc C. gpresult D. gpupdateView AnswerAnswer: A Explanation: The feature that allows a technician to configure policies in a Windows 10 Professional desktop is gpedit. Gpedit is a command that...

May 16, 2023 No Comments READ MORE +

Which of the following would be the BEST method to protect against unauthorized use?

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?A . Implementing password expiration B. Restricting user permissions C. Using...

May 16, 2023 No Comments READ MORE +