Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.) PowerShell VBScript C# Java Python Explanation: Compiled languages like C, C++, C#,…

Continue ReadingWhich two programming languages require the program to be converted into executable code using a compiler? (Choose two.)

What is a common responsibility of a level one call center technician?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is a common responsibility of a level one call center technician? entering a concise description of a customer problem into a ticketing system remotely connecting to customer devices and…

Continue ReadingWhat is a common responsibility of a level one call center technician?

A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend? Use a mantrap. Buy an IPS.…

Continue ReadingA PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?

A hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical office and is asked for the drive so it can be used in a different computer. How should the technician handle this situation?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical…

Continue ReadingA hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical office and is asked for the drive so it can be used in a different computer. How should the technician handle this situation?

A user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to…

Continue ReadingA user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied?

A user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first? CPU hard drive motherboard…

Continue ReadingA user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first?

The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were…

Continue ReadingThe corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?

Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which action would help a technician to determine if a denial of service attack is being caused by malware on a host? Disconnect the host from the network. Log on…

Continue ReadingWhich action would help a technician to determine if a denial of service attack is being caused by malware on a host?

Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.) The device must be powered on. The device…

Continue ReadingWhich two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)

What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.) The user interface can be extensively customized. The operating system can be fine-tuned to improve…

Continue ReadingWhat are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)

It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem…

Continue ReadingIt has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)

Which two security precautions will help protect a workplace against social engineering? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two security precautions will help protect a workplace against social engineering? (Choose two.) performing daily data backups encrypting all sensitive data stored on the servers registering and escorting all…

Continue ReadingWhich two security precautions will help protect a workplace against social engineering? (Choose two.)

A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend? antimalware port scan dual…

Continue ReadingA technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?

A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend? antimalware ping sweep dual…

Continue ReadingA technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?

A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend? antimalware IPS ping…

Continue ReadingA technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?

A technician has been asked by a manager to recommend a security solution for protecting a computer against keyloggers. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has been asked by a manager to recommend a security solution for protecting a computer against keyloggers. Which security technique should the technician recommend? antimalware ASA ping sweep…

Continue ReadingA technician has been asked by a manager to recommend a security solution for protecting a computer against keyloggers. Which security technique should the technician recommend?

A technician has been asked by a manager to recommend a security solution for protecting a computer against spyware. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has been asked by a manager to recommend a security solution for protecting a computer against spyware. Which security technique should the technician recommend? antimalware dual authentication ping…

Continue ReadingA technician has been asked by a manager to recommend a security solution for protecting a computer against spyware. Which security technique should the technician recommend?

A technician has been asked by a manager to recommend a security solution for protecting a computer against ransomware. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has been asked by a manager to recommend a security solution for protecting a computer against ransomware. Which security technique should the technician recommend? antimalware encryption ping sweep…

Continue ReadingA technician has been asked by a manager to recommend a security solution for protecting a computer against ransomware. Which security technique should the technician recommend?

A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend? antimalware SSL ping sweep…

Continue ReadingA technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend?