Which action could be used to determine if a host is compromised and flooding traffic onto the network?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which action could be used to determine if a host is compromised and flooding traffic onto the network? Group of answer choices Unseat and then reconnect the hard drive connectors…

Continue ReadingWhich action could be used to determine if a host is compromised and flooding traffic onto the network?

A technician in a small business is configuring the local security policy for a computer. Which configuration setting would the technician use to require the user to change the password after 90 days?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician in a small business is configuring the local security policy for a computer. Which configuration setting would the technician use to require the user to change the password…

Continue ReadingA technician in a small business is configuring the local security policy for a computer. Which configuration setting would the technician use to require the user to change the password after 90 days?

Which type of hard drive format is commonly performed at the factory where the drive is assembled?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of hard drive format is commonly performed at the factory where the drive is assembled? Group of answer choices multifactor low-level standard EFS Answers Explanation & Hints: The…

Continue ReadingWhich type of hard drive format is commonly performed at the factory where the drive is assembled?

A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use…

Continue ReadingA technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation? (Choose two.)

A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has…

Continue ReadingA technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?

A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The…

Continue ReadingA technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)

When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket? Group of answer…

Continue ReadingWhen a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

When configuring Windows security, which term is used to mean a rule assocated with an object such as a folder or printer?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

When configuring Windows security, which term is used to mean a rule assocated with an object such as a folder or printer? Group of answer choices ActiveX permission right firewall…

Continue ReadingWhen configuring Windows security, which term is used to mean a rule assocated with an object such as a folder or printer?

A corporate executive has asked the IT department to provide a solution to ensure data security of removable drives that are being taken off the premises. Which security solution should be recommended?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A corporate executive has asked the IT department to provide a solution to ensure data security of removable drives that are being taken off the premises. Which security solution should…

Continue ReadingA corporate executive has asked the IT department to provide a solution to ensure data security of removable drives that are being taken off the premises. Which security solution should be recommended?

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information? Group of…

Continue ReadingWhich type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

As data is being stored on a local hard disk, which method would secure the data from unauthorized access? Group of answer choices a duplicate hard drive copy two factor…

Continue ReadingAs data is being stored on a local hard disk, which method would secure the data from unauthorized access?

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.) Group of answer choices ports…

Continue ReadingWhich two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

How is the representation of apps in the Windows Phone operating system interface different from the representations used in Android and iOS?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

How is the representation of apps in the Windows Phone operating system interface different from the representations used in Android and iOS? Windows Phone uses rectangles that can display active…

Continue ReadingHow is the representation of apps in the Windows Phone operating system interface different from the representations used in Android and iOS?

A person with an Android mobile device holds down the power button and the volume down button until the device turns off. The person then turns the device back on. What was this person doing to the device?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A person with an Android mobile device holds down the power button and the volume down button until the device turns off. The person then turns the device back on.…

Continue ReadingA person with an Android mobile device holds down the power button and the volume down button until the device turns off. The person then turns the device back on. What was this person doing to the device?

What are two types of cloud-enabled services for mobile devices? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two types of cloud-enabled services for mobile devices? (Choose two.) locator apps remote backup passcode configuration screen calibration screen app locking Answers Explanation & Hints: Locator apps and…

Continue ReadingWhat are two types of cloud-enabled services for mobile devices? (Choose two.)

Which three methods can be used to unlock a smartphone? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which three methods can be used to unlock a smartphone? (Choose three.) NFC passcode encryption swipe pattern QR code scan biometric information Answers Explanation & Hints: A smartphone should use…

Continue ReadingWhich three methods can be used to unlock a smartphone? (Choose three.)

A system administrator is using the crontab command to edit an entry on a Linux server. Which service is the administrator configuring?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A system administrator is using the crontab command to edit an entry on a Linux server. Which service is the administrator configuring? editing a shell script to run when the…

Continue ReadingA system administrator is using the crontab command to edit an entry on a Linux server. Which service is the administrator configuring?

What are two features of the Android operating system? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two features of the Android operating system? (Choose two.) Android is open source and allows anyone to contribute to its development and evolution. Android has been implemented on…

Continue ReadingWhat are two features of the Android operating system? (Choose two.)

Which two terms describe unlocking Android and iOS mobile devices to allow users full access to the file system and full access to the kernel module? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two terms describe unlocking Android and iOS mobile devices to allow users full access to the file system and full access to the kernel module? (Choose two.) patching rooting…

Continue ReadingWhich two terms describe unlocking Android and iOS mobile devices to allow users full access to the file system and full access to the kernel module? (Choose two.)