A worker in the records department of a hospital in the United States accidentally sends a patient’s medical record to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. Which two types of compliance standards best match the breach of confidentiality? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A worker in the records department of a hospital in the United States accidentally sends a patient's medical record to a printer in another department. When the worker arrives at…

Continue ReadingA worker in the records department of a hospital in the United States accidentally sends a patient’s medical record to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. Which two types of compliance standards best match the breach of confidentiality? (Choose two.)

A technician is attempting to securely configure a Linux web server on the public-facing side of the firewall. What port type and number are most likely required to be open on the firewall to allow this traffic through?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician is attempting to securely configure a Linux web server on the public-facing side of the firewall. What port type and number are most likely required to be open…

Continue ReadingA technician is attempting to securely configure a Linux web server on the public-facing side of the firewall. What port type and number are most likely required to be open on the firewall to allow this traffic through?

A system administrator needs to perform manual updates on a remote Linux workstation using a Windows 10 PC. Which remote access tool should the administrator use to securely access and configure the Linux device across the network?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A system administrator needs to perform manual updates on a remote Linux workstation using a Windows 10 PC. Which remote access tool should the administrator use to securely access and…

Continue ReadingA system administrator needs to perform manual updates on a remote Linux workstation using a Windows 10 PC. Which remote access tool should the administrator use to securely access and configure the Linux device across the network?

A programmer used an operator to compare values within a program and the resulting logical data type was “false”. Which test condition would have provided the result of “false”?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A programmer used an operator to compare values within a program and the resulting logical data type was "false". Which test condition would have provided the result of "false"? 8…

Continue ReadingA programmer used an operator to compare values within a program and the resulting logical data type was “false”. Which test condition would have provided the result of “false”?

Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.) PowerShell VBScript C# Java Python Explanation: Compiled languages like C, C++, C#,…

Continue ReadingWhich two programming languages require the program to be converted into executable code using a compiler? (Choose two.)

What is a common responsibility of a level one call center technician?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is a common responsibility of a level one call center technician? entering a concise description of a customer problem into a ticketing system remotely connecting to customer devices and…

Continue ReadingWhat is a common responsibility of a level one call center technician?

A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend? Use a mantrap. Buy an IPS.…

Continue ReadingA PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?

A hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical office and is asked for the drive so it can be used in a different computer. How should the technician handle this situation?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical…

Continue ReadingA hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical office and is asked for the drive so it can be used in a different computer. How should the technician handle this situation?

A user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to…

Continue ReadingA user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied?

A user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first? CPU hard drive motherboard…

Continue ReadingA user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first?

The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were…

Continue ReadingThe corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?

Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which action would help a technician to determine if a denial of service attack is being caused by malware on a host? Disconnect the host from the network. Log on…

Continue ReadingWhich action would help a technician to determine if a denial of service attack is being caused by malware on a host?

Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.) The device must be powered on. The device…

Continue ReadingWhich two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)

What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.) The user interface can be extensively customized. The operating system can be fine-tuned to improve…

Continue ReadingWhat are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)

It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem…

Continue ReadingIt has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)

Which two security precautions will help protect a workplace against social engineering? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two security precautions will help protect a workplace against social engineering? (Choose two.) performing daily data backups encrypting all sensitive data stored on the servers registering and escorting all…

Continue ReadingWhich two security precautions will help protect a workplace against social engineering? (Choose two.)

A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend? antimalware port scan dual…

Continue ReadingA technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?

A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend? antimalware ping sweep dual…

Continue ReadingA technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?