Which of the following should be done to attempt to remove the offending malware?
After several passes with a malware removal program, the program keeps detecting the same
malware infection after a reboot. Which of the following should be done to attempt to remove the
offending malware?
Which of the following actions would enable the system to recognize the device as a Blu-Ray device?
Ann, a user, has recently installed a new Blu-Ray ROM in her desktop computer. The computer
recognizes the device as a DVD-ROM. Which of the following actions would enable the system to
recognize the device as a Blu-Ray device?
Which of the following would BEST address the administrator’s concerns?
A security administrator has concerns regarding employees saving data on company
provided mobile devices. Which of the following would BEST address the administrator’s
concerns?
Which of the following tools would be used to find the issue with the network connection?
A user, Joe, calls and states every few hours he is unable to connect to the Internet for several
minutes but is able to access internal sites during this time. Which of the following tools would be
used to find the issue with the network connection?
Which of the following IEEE 802.11 standards operates natively in both the 2.4Ghz and 5Ghz spectrum?
Which of the following IEEE 802.11 standards operates natively in both the 2.4Ghz and 5Ghz
spectrum?
which of the following concepts?
Identifying residual risk is MOST important to which of the following concepts?
Which of the following solutions could BEST prevent the application from reaching the web?
A technician is trying to prevent a local application from reaching the web due to security concerns.
Which of the following solutions could BEST prevent the application from reaching the web? (Select
TWO).
Which of the following external ports would a technician use to connect a keyboard?
Which of the following external ports would a technician use to connect a keyboard? (Select TWO).
Which of the following security techniques is MOST appropriate to do this?
The information security technician wants to ensure security controls are deployed and
functioning as intended to be able to maintain an appropriate security posture. Which of the
following security techniques is MOST appropriate to do this?
Which of the following would mitigate this issue without reducing productivity?
For the last year, a company has gathered statistics on the most common security incidents. The
highest percentage deals with opening email attachments that contain malware. Which of the
following would mitigate this issue without reducing productivity?
