A+ Core 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following could help identify the issue with a slow computer? A.Disk cleanup B.Group Policy Editor C.Disk Management D.Resource Monitor

D

Which of the following would allow PCs to connect to the internet without allowing the local router to assign network addresses to any device? A.Assigning a static IP B.Set up MAC filtering C.Place all devices in the DMZ D.Enable port forwarding on all devices

A

Which of the following would allow a networked device to maintain the same IP address at all times without assigning a static IP address? A.DHCP reservation B.Port forwarding C.DNS A record D.NAT E.Static IP address assignment

A

Which of the following would exclude a folder from being cataloged by a Windows 10 search? A.Privacy B.Indexing options C.System D.Device manager

A

While replacing the CPU in a desktop computer, which safety procedure would best protect components of the PC? A.Utilizing an ESD strap B.Disconnecting the computer from the power source C.Placing the PSU in an antistatic bag D.Ensuring proper ventilation E.Removing dust from the ventilation fans F.Ensuring equipment is grounded

A

Your PC has been running slower than usual. Disk, CPU, and RAM utilization seem to be fine but your GPU is running extremely hot. What is the most likely malware on this PC? A.Spyware B.Cryptominer C.Ransomware D.Boot sector virus

B

Your antivirus software indicates a virus infection. You think it happened while browsing the internet. You don't recognize this antivirus interface or installing an antivirus. Which of the following is the next step you should take? A.Shut down the infected computer and swap it with another computer B.Investigate what the interface is and what triggered it to pop up C.Proceed with initiating a full scan and removal of the viruses using the presented interface D.Call the phone number displayed in the interface of the antivirus removal tool

B

Your company is having a hard time managing a large amount of help requests. Which of the following is the best solution? A.Implementing a support portal B.Creating a ticketing system C.Commissioning an automated callback system D.Submitting tickets through email

B

Your friend is trying to install an application that claims to optimize performance. Your friend downloaded the application directly from the vendor's website. Since downloading the application, their phone has been experiencing high network utilization and has displayed multiple security warnings. Which of the following should you do first to help your friend? A.Reset the phone to factory settings B.Uninstall the fraudulent application C.Increase the data plan limits D.Disable the mobile hotspot

B

When attempting to use a search engine, the user is redirected to an unfamiliar domain every time. A technician scans the computer offline and determines all OS files and web browser executables are unchanged from the default image. Additionally, no viruses are found on the machine. No other users are experiencing the same issue. Which of the following should be performed next to diagnose the issue (pick two) A.Change the DNS server from the corporate server to 8.8.8.8 B.Check for malicious browser extensions C.Perform a full reinstall of the OS D.Inspect the web proxy settings E.Recreate the user's profile and migrate the user's files F.Perform an online repair of the operating system

B,D

Which of the following should be updated if you are worried that the change advisory board will not approve your change due to a lack of "alternative actions if implementation failed"? A.Scope of change B.Risk level C.Rollback plan D.End user acceptance

C

Which of the following technologies would disable a port if incoming traffic doesn't match an approved list? A.Access Control List B.MAC filtering C.Port Security D.MDM policy

C

Which of the following tools could be used if a computer is running slowly because of a fragmented hard drive? A.Resmon.exe B.Msconfig.exe C.Dfrgui.exe D.Msinfo32.exe

C

Which of the following would be the most secure method to remove information from a hard drive to be reused? A.Reinstalling Windows B.Performing a quick format C.Using disk-wiping software D.Deleting all files from command-line interface

C

Which of the following would best remove an installed rootkit? A.Application updates B.Anti-malware software C.OS reinstallation D.File restore

C

Which of the following would most likely cause a system's settings and files to be restored to default? A.System reset B.System update C.System restore D.System refresh

C

Which setting should be changed first when setting up a new SOHO Wi-Fi router for the first time? A.Encryption B.Wi-Fi channel C.Default passwords D.Service set identifier

C

Which of the following command could be used to find information of a wireless connection while working on a MAC? A.apt-get B.iwconfig C.sudo D.ifconfig

D

Which of the following filetypes be most likely used for installing new software on a macOS computer? A..deb B..vbs C..exe D..app

D

Which of the following is the best solution in the Power Options menu to prevent a laptop from going to sleep when it is closed and on the docking station? A.Select the option "choose what closing the lid does" and select When I close the Lid under the Plugged In category to Do Nothing B.Select the option "Choose When to Turn Off the Display" and select Turn Off Display under the Plugged in category to Never C.Click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to never D.Click the Change Plan Settings button for the enabled power plan and select Put the computer to Sleep under the Plugged in Category to Never

D

Which of the following is the most cost-effective version of Windows 10 that supports Remote Desktop? A.Home B.Pro for Workstations C.Enterprise D.Pro

D

Which of the following is true when moving a file from one NTFS disk to another NTFS disk? A.The file has both source and destination permissions B.The file keeps the source permissions C.The file permissions must be manually set D.The fill receives the destination permissions

D

Which of the following mitigates tailgating? A.Biometrics B.Badge reader C.Smart card D.Man trap

D

Which of the following policies includes "right to be forgotten" requests? A.PHI B.PCI C.PII D.GDPR

D

Which of the following should be updated to prevent new activities, such as cryptomining, on a work desktop? A.MDM B.EULA C.IRP D.AUP

D

Which of the following would be used to encrypt an email? A.A smart card B.A firewall C.Filtering D.A certificate

D

A user needs to access files on a drive shared from another desktop on the network in the same small office. Which of the following could achieve this goal? A.Configure the network as private B.Enable a proxy server C.Grant the network admin role to the user D.Create a shortcut to public documents

A

After their anti-virus expired, a user downloaded and installed a free system protection application they found online. The application immediately found multiple rootkits, Trojans, viruses, and missing patches. The application could not successfully fix all the issues and instead recommended the user call technical support. Which of the following is the first step in repairing the user's computer? A.Remove the rogue antivirus B.Install windows updates C.Reimage the computer D.Call the technical support number

A

During a flight, you unexpectedly receive many pictures of rabbits while trying to listen to music via in-flight Wi-Fi on your iPhone. You have no recollection of seeing these pictures before. What should you do to best prevent this issue? A.Set AirDrop so that transfers are only accepted from known contacts B.Completely disable all wireless systems during the flight C.Discontinue using iMessage and only use secure communication applications D.Only allow messages and calls from saved contacts

A

For which of the following logical security concepts is 802.1x used? A.User authentication B.Smart card C.Port security D.MDM policy

A

One user's PC is unable to log into the domain while another user can access the domain just fine. The user even tried to log in with a local account, but is unable to browse to a secure intranet site in order to access troubleshooting tools. Which if the most likely cause of this issue? A.Time drift B.Dual in-line memory module failure C.Application crash D.Filesystem errors

A

To which of the following would you ground an ESD strap to when adding memory to a PC? A.The computer chassis B.The surge protector C.A wooden workstation D.power supply E.The user F.The RAM stick

A

What is the strength of a rainbow table in an attack? A.They contain precomputed hashes B.They cover a wide spectrum of attack vectors C.They can run persistent DDoS attacks D.The utilize custom dictionaries

A

Which of the following could be used to best dispose of hard drives containing PII? A.Drilling B.Degaussing C.Low-level formatting D.Erasing/wiping

A

Which of the following is the most secure? A.WPA3 B.WPA-AES C.WEP D.WPA-TKIP

A

Which of the following issues would most likely cause a user to be unable to read their own previously encrypted files, despite turning their phone off and back on again? A.An expired certificate B.A bad TPM C.An unencrypted phone D.Wrong mail server selected

A

Which of the following should be used to encrypt a workstation that will be used for point-of-sales transactions? A.Data in transit encryption B.File encryption C.USB drive encryption D.Disk encryption

A

Which of the following standards deal with credit card data? A.PCI B.PHI C.PGP D.PII

A

Which of the following tools can be used to automatically launch a website at a specific time? A.taskschd.msc B.Perfmon.msc C.Lusrmgr.msc D.Eventvwr.msc

A

Which of the following types of backups should be completed first for a new backup system? A.Full B.Non-parity C.Differential D.Incremental

A

Which of the following types of scripts would most likely be used to manage Active Directory users with built-in Windows tools? A..ps1 B..rb C..py D..jsp

A

While troubleshooting a customer's laptop, you receive a phone call. You ignore the call and set your phone to silent. Which of the following best describes your actions? A.Avoid distractions B.Deal appropriately with customer's confidential material C.Adhere to user privacy policy D.Set and meet timelines

A

While trying to delete a partition in Windows Disk Management, a user sees an error and is unable to delete the desired partition. Which of the following CLI tools would most likely be used to solve this problem? A.diskpart B.taskkill C.chkdsk D.netstat

A

You discover an unknown executable with a random string name running on a system. You terminate the process and the computer returns to normal operations. It is believed to be caused by an infected file, but the antivirus isn't detecting a threat. Which of the following would be the most effective way to check other machines on the network for the same unknown threat? A.Run a startup script that removes files by name B.Provide a sample to the antivirus vendor C.Manually check each machine D.Monitor outbound network traffic

A

____ is true with port security. A.Devices must match a list of allowed MAC addresses to enter the network B.Devices need to conform to the policies set forth by the MDM software C.DLP software will be monitoring on that port D.A firewall is actively monitoring a port with heuristic analysis

A

A computer in your company's environment has indicated that is was infected with 258 viruses. The popup reporting these viruses asks for payment to remove them. You would have assumed the company provided antivirus would have prevented this. It is also discovered these popups are only show up when a browser is opened. Which steps would most likely solve this issue? (Pick Two) A.Scan the computer with the company-provided AV software B.Install a new hard drive and clone the computer's drive to it C.Deploy and ad-blocking extension to the browser D.Uninstall the company-provided antivirus software E.Click the link in the message to pay for virus removal F.Perform a reset of the computer's browser

A,C

Your phone is displaying the following symptoms: •It is hot, even when not in use •Applications commonly crash, especially when others are launched •Certain applications have the wrong screen orientation. Which two would most likely resolve your issues with the minimal impact? A.Turn on autorotation B.Activate airplane mode C.Close unnecessary applications D.Perform a factory reset E.Update the device's OS F.Reinstall the applications that have crashed

A,C

Which of the following solutions would be used to ensure access to quickly recoverable and complete back ups of recently changed data? (Pick Two) A.File level B.Bare Metal C.Tape backup D.Shadow Copy E.Critical applications F.Image level

A,D

Which two solutions would best secure physical access to a data center? A.Biometric lock B.Badge reader C.USB token D.Video surveillance E.Locking rack F.Access Control Vestibule

A,F

Your CEO noticed a news report about cybercrime where remote-access tools that your company uses for support were used in the crime. The report stated that the attackers were able to brute force credentials to access systems on the victim's network. Which of the following could best limit your company's risk? (Pick two) A.Enable multifactor authentication for each support account B.Limit remote access to destinations inside the corporate network C.Block all support accounts from logging in from foreign countries D.Configure a replacement remote-access tool for support cases E.Purchase a password manager for remote-access tool users F.Enforce account lockouts after five bad password attempts

A,F

Which of the following would need to be maintained through the forensic evidence life cycle? A.Acceptable use B.Chain of custody C.Security policy D.Information management

B

Which of the following would you most likely do to preserve evidence for possible litigation? A.Encrypt the files B.Clone any impacted hard drives C.Contact the cyber insurance company D.Inform law enforcement

B

A new network topology was created in order to aid Help Desk in remote troubleshooting . In which of the following locations should the diagram be saved? A.An online forum where members can help troubleshoot network issues B.In a network share only accessible to the IT department C.A folder on the admin's workstation D.In a network share where all employees can access it

B

A remote user in a satellite office contacted help desk requesting an OS upgrade. Which of the following would best fill the user's needs? A.CD B.Network C.USB D.Local

B

A user's account was breached after 6,000 attempts were made with a dictionary attack. What would have best mitigated this threat? A.Encryption at rest B.Account lockout C.Automatic screen lock D.Antivirus

B

After trying multiple times to roll back the state of their system, a coworker is still experiencing frequent malware symptoms. What would most likely resolve this issue? A.Quarantining system files B.Reimaging the workstation C.Encrypting the hard drive D.Disabling TLS 1.0 support

B

What is the expected outcome of the "cat sample.txt" command being issued on a Linux system? A.The contents of sample.txt will be replaced with a blank document B.The contents of sample.txt would be displayed C.The contents of sample.txt would be categorized alphabetically D.The contents of sample.txt would be copied to another sample.txt file

B

What is the first step when troubleshooting a suspected short in a computer's power supply? A.Put on an ESD strap B.Disconnect the power before servicing the PC C.Place the PC on the grounded work bench D.Place components on an ESD mat

B

What is the next step in the change process after a change request has been approved? A.End user acceptance B.Perform risk analysis C.Communication to stakeholders D.Sandbox testing

B

When visiting a website, a user sees the following pop-up: "Website blocked due to PUP" Which of the following would resolve the issue immediately? A.Check the computer for a rogue antivirus B.Update the antivirus and run a scan C.Advise the user to visit the website in incognito mode D.Enable pop-ups for the websites

B

Which OS provides a lightweight, browser-based interface? A.FreeBSD B.Chrome OS C.macOS D.Windows

B

Which of the following OS defaulted to a tiled menu? A.Windows 7 B.Windows 8 C.Windows 8.1 D.Windows 10

B

Which of the following backup methods would best suit a situation where only a few files are regularly modified but storage space is a concern? A.Full B.Differential C.Off-site D.Grandfather-father-son

B

Which of the following could be used to troubleshoot a server with a failing GUI? A.SFTP B.SSH C.VNC D.MSRA

B

Which of the following is likely to be the best secure option on a ten year old wireless router? A.WPA2 with TKIP B.WPA2 with AES C.WPA3 with AES-256 D.WPA3 with AES-128

B

Which of the following might be specified as a requirement for photo editing software? A.HDD speed B.RAM quantity C.Bandwidth D.CPU compatibility

B

Which of the following should be checked first to determine the cause of a phone's hotspot connection to greatly vary in speed overtime when used to stream videos and download files? A.Software updates B.Data plan limits C.Hotspot encryption D.The connected laptop's firewall

B

Which of the following technologies would support centralizing the desktop support functions of a large organization? A.RDP B.VNC C.SSH D.VPN

B

Which of the following tools can be used to resize partitions on an internal macOS drive? A.Console B.Disk Utility C.Time Machine D.FileVault

B

Which of the following would best prevent data from being stolen if a mobile device is stolen? A.Anti-malware B.Remote wipe C.Locator applications D.Screen lock

B

Which of the following would best prevent vehicles from driving into a building while allowing pedestrians? A.Guards B.Bollards C.Motion Sensors D.Access Control Vestibule

B

While running a 64 bit version of an OS, you want to run a legacy 32-bit application. Which option would be the best way to go about this? A.Install a second OS on the computer that is 32 bit B.Install the 32-bit application C.Install a 32-bit virtual environment D.Find an alternative application to install

B

While traveling overseas, Grant is unable to access his company file share after an OS update. After restarting his device, he still can't access the share. Grant calls helpdesk and a tech verifies he can make calls and access the internet. Which of the following should be done next to fix the issue? A.Navigate to the VPN profile and delete the Pre-shared key B.Instruct Grant to open the MDM application and verify functionality C.Navigate to the company's intranet page and use links to access the fileshare D.Instruct Grant to throw away his phone and wait until he returns.

B

Why would you be unable to join a domain on a Windows 10 laptop? A.The domain's processor compatibility is not met B.The laptop has Windows 10 Home installed C.The laptop does not have an onboard ethernet adapter D.The laptop does not have all current windows updates installed

B

You need Linux to run a specific open-sourced application not available for your version of Windows. Which of the following solutions would be the most efficient solution, considering the limited bandwidth of your environment and needing to execute Linux and Windows applications in parallel. A.Install and run Linux and the required applications in a PaaS cloud environment B.Install and run Linux and the required applications as a virtual machine installed under the Windows OS C.Use a swappable drive bay for the boot drive and install each OS with applications on its own drive. Swap the drives as needed. D.Set up a dual boot system by selecting the option to install Linux alongside Windows

B

You want to use a system running a community-managed OS to experiment with cross platform software development, and you strongly prefer open-source systems. Which of the following would best fit your wants? A.Windows B.CentOS C.Linux D.Mac

B

A message appears on your computer stating that your files are encrypted. Which of the following has infected your computer? A.Cryptominer B.Phishing C.Ransomware D.Keylogger

C

A user calls you to report an issue, and you submit a ticket on the user's behalf. Which of the following practices should be done to make sure the ticket is associate with the correct user? A.Have the user provide a callback phone number to be added to the ticket B.Assign the ticket to the department's power user C.Register the ticket with a unique user ID D.Provide the user with a unique ticket number that can be reference in later calls

C

A user's icons, documents, and personalized settings are suddenly missing despite being there the previous day. Which of the following should be done to resolve the issue? A.Perform a system refresh B.Change the account permissions C.Repair the profile D.Restore the data from backup

C

Many users operate on the same workstation and report normal operations, except for one. The system admin has validated that the system functions normally. Which of the following should the system admin attempt next? A.Increase the paging file size B.Run the chkdsk command C.Rebuild the user's profile D.Add more system memory E.Defragment the hard drive

C

PDFs seem to be opened in Microsoft Edge instead of Firefox. Which of the following utilities would ensure all PDFs are opened in Firefox? A.Network and sharing center B.Programs and Features C.Default Apps D.Add or Remove programs

C

Somebody is calling you while pretending to be a Microsoft employee. What best describes this attack? A.Pretexting B.Spoofing C.Vishing D.Scareware

C

The following technical requirements exist for a new application: Quad Core processor 250 GB of hard drive space 6GB of RAM Touch screens Which of the following will you be able to fully take advantage of, assuming you upgraded from a 32-bit Windows OS to a 64-bit before installing the application? A.CPU B.Hard drive C.RAM D.Touch screen

C

Which of the following authentication protocols could be used for users working in the field? A.WEP B.WPA2 C.RADIUS D.TKIP

C

Which of the following can be used to troubleshoot a Windows system over a public network? A.Telnet B.RDP C.Third-party screen sharing app D.SSH

C

Which of the following commands would help identify filenames that a company would later delete? A.ps aux | grep 'string' B.cd / | mv 'string' C.ls / | grep 'string' D.dd / |rm 'string

C

Which of the following could be used to implement secure physical access to a building? A.Geofence B.Alarm system C.Badge reader D.Motion sensor

C

Which of the following could best refresh an old laptop running Windows 10 for a new user? A.Internet-based upgrade B.Repair installation C.Clean install D.USB repair E.In-place upgrade

C

Which of the following is an open-source OS for both servers and workstations? A.iOS B.Windows 10 C.Linux D.OS X

C

While troubleshooting a laptop at a client's site, a software update needs to be downloaded. However, the Wi-Fi network you are connected to has a proxy which is blocking traffic to the update site. Which of the following would most likely allow you to download the update? A.Change the DNS address to 8.8.8.8 B.Update Group Policy C.Add the site to the network's exceptions list D.Verify the software license is current

C

While updating your CAD software, you notice the latest version will force all local backups to be migrated to the software's cloud server. Which of the following would most likely be a concern? A.All updated software must be tested with all system types and accessories B.Extra technician hours must be budgeted during installation of updates C.Network utilization will be significantly increased due to size of CAD files D.Large update and installation files will overload local hard drives

C

You are running a PC in your home using Windows 10 in a typical configuration. However, you are having issue loading certain applications after a reboot in the middle of the night. What should be the first step in troubleshooting? A.Install alternate open-source software in place of the applications with issues B.Run both CPU and RAM tests to ensure that all hardware functionality is normal C.Check for any installed patches and roll them back one at a time until the issue is resolved D.Reformate the hard drive, and the reinstall the newest Windows 10 release, followed by all applications

C

You need to create another virtual desktop space. Which of the following applications will accomplish this task? A.Dock B.Spotlight C.Mission Control D.Launchpad

C

You receive a call from a user asking about how to get a Windows update. Which of the following should you do? A.Have the user consider using an iPad if the user is unable to complete updates B.Have the user text the user's password to you C.Ask the user to click in the Search field, type Check for Updates, and the press Enter D.Advise the user to wait for an upcoming automatic patch

C

You see the following paired with a file: 233e4f54fee93f5ee23bc4a356b8945f4 What is the purpose of this string? A.XSS verification B.AES verification C.Hash verification D.Digital signature verification

C

Your sibling calls you and tells you that none of their files would open, and that a new application is requesting payment in exchange for file access. After verifying that their computer is infected with ransomware, what should you do first? A.Scan and remove the malware B.Schedule automated malware scans C.Quarantine the system D.Disable system restore

C

Which of the following would you recommend be implemented to provide guidelines and recommendations to secure an infrastructure that recently implemented a work from home policy including mobile devices? A.Change management policy B.EULA C.BYOD policy D.Business Continuity Plan E.MDM policy F.Time-based Login

C,E

A tech needs to adjust folder permissions for the Marketing department's fileshares. The tech must ensure users in the sales group cannot be granted access to the folders, even if the folders inherit permissions from the parent folder. Which of the following would accomplish this task? A.Encrypting File System B.Administrative Shares C.BitLocker D.Deny permissions

D

A user reports the following error: "Logon failure: The target account name is incorrect" Which of the following actions could make this error message disappear? A.Remove the user from the domain and home group, then add them to Active Directory B.Remove the computer from Active Directory and add it to a workgroup C.Remove the company from the company's workgroup, add it to a homegroup, and then add it to the Active Directory D.Remove the computer from the domain and Active Directory, and then add it to the domain E.Turn off the monitor

D

After a user lost an application due to a System Restore. A tech steps in and determines the applications was emailed to the user from an unknown source and downloaded from a link in the email. Which of the following should the technician do next? A.Educate the user B.Reboot the computer C.Update the anti-malware software D.Update the antivirus software

D

After a week of successfully connecting to a network printer, nobody is able to reach the printer anymore. Which can be done to enable everybody to print again? A.Configure the printer NIC for full duplexing B.Locally attach the printer to a user's device C.Configure the printer with a dynamic IP D.Map the printer by hostname rather than IP

D

After clicking on an email link you see an error on a webpage that states, "There is a problem with this website's security certificate". Upon further investigation it appears that the certificate for this website was not issued by a trust CA. The link was supposedly to your bank. Which of the following should you do first? A.Update the browser's CRLs B.File a trouble ticket with the bank C.Contact the ISP to report your concern D.Exit the browser

D

After encountering a previously identified issue, you conduct some research, find the solution, and fix the problem. Which of the following should be done next in case the issue is encountered again? A.Inform your immediate boss about the findings B.Email all other technicians to explain the issue and solution C.Enter the solution into the ticket and close it D.Add the findings to the knowledge base

D

After installing a known-good, compatible motherboard on a new laptop. However, the motherboard is found not to be working. Which of the following should have been done to prevent damage? A.Removed all jewelry B.Completed an inventory of tools before use C.Practiced electrical fire safety D.Connected a proper ESD strap

D

After updating the OS a system's touchscreen ceased working, which of the following Windows locations should be checked first? A.System settings B.Devices and printers C.Display settings D.Device manager

D

Nate, a user, is commonly prompted to input his password when attempting to access his Outlook email. Additionally, he often gets locked out several times a day as he can never remember his password. His more experienced coworkers think he is having issues with cached credentials on his system; which of the following tools could determine if Nate is using cached account information? A.Administrative tools B.BitLocker C.Sync center D.Credential Manager

D

What is the most important environmental concern in a data center? A.Battery disposal B.ESD mats C.Toner Disposal D.Humidity levels

D

You need to find a way to transfer sensitive personal info between offices. Your company uses USB drives and is resistant to change. Corporate policy states all media at rest must be encrypted. Which would be the best way to meet your goal? A.Deploy a secondary hard drive with encryption on the appropriate workstation B.Configure a hardened SFTP portal for file transfers between file servers C.Require files to be individually password protected with unique passwords D.Enable BitLocker To Go with a password that meets corporate requirements

D

You need to transfer a large number of files over an unreliable connection. You'd like to be able to resume the process if the connection is interrupted. Which tool would be used? A.Sfc B.Chkdsk C.Git clone D.robocopy

D

You need your USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which filesystem makes the most sense for the USB drive? A.AT32 B.Ext4 C.NTFS D.exFAT

D

You've already spent hours trying to repair the CEO's laptop, but the CEO needs the device returned ASAP. Which step should you take next? A.Continue researching the issue B.Repeat the iterative processes C.Inform the CEO the repair will take a couple of weeks D.Escalate the ticket

D

You've recently deployed a new spam gateway for your small company. However, you still get spam occasionally. You are concerned this may lead to potential threats breaching your network. Which of the following would most effectively deal with this issue? A.Adjusting the spam gateway B.Updating firmware for the spam appliance C.Adjusting AV settings D.Providing user training

D

Your phone's data usage is way above average, and you suspect an installed application is transmitting data in the background. You would like to be alerted if an application attempts to communicate with the internet. Which of the following best addresses your concern? A.Operating system updates B.Remote wipe C.Antivirus D.Firewall

D

Malware was installed on a workstation via a phishing attack which was initiated from a link that was included in an email. Which of the following could best address this issue? (Pick Two) A.Ensure the anti-rootkit utility is up to date and run it B.Update the host firewall and block port 80 C.Restore the system using last known good config D.Ensure antivirus is up to date and install patches E.Educate the user on verifying email links by hovering over them F.Ensure endpoint protection is up to date and run the utility to remove the threat

D,F

Your phone has become more sluggish over time. Upon inspection, you find several malicious applications on the device, so you reset the phone. You then install MDM software to connect it to the company networks. What else should be done to be able to, primarily, prevent this threat in the future and safety connect to the company network? A.Prevent a device root B.Disable biometric authentication C.Require a PIN on the unlock screen D.Enable developer mode E.Block a third-party application installation F.Prevent GPS spoofing

E


Set pelajaran terkait

CH. 21 Caring for Clients in Shock

View Set

PE&103 - Chapter 12: Improving Your Fitness

View Set

Rhetoric of Country Music Exam #2

View Set

Chapter 2 - Company and Marketing Strategy

View Set

Wong Ch. 14 Health Promotion of School-Age Children

View Set