Which of the following log files should the technician review to assist in troubleshooting these errors?
A user’s workstation is experiencing multiple errors when trying to open programs. Which of the
following log files should the technician review to assist in troubleshooting these errors?
Which of the following steps should the technician take NEXT?
Activity logs show a large amount of data downloaded from a company server to an employee’s
workstation overnight. Upon further investigation, the technician identifies the data as being outside
the scope of the employee’s regular job functions. Which of the following steps should the
technician take NEXT?
Which of the following would mitigate and secure the auditors finding?
An auditor’s report discovered several accounts with no activity for over 60 days. The
accounts were later identified as contractors’ accounts who would be returning in three
months and would need to resume the activities. Which of the following would mitigate and
secure the auditors finding?
All of the following are part of the monitoring and controlling process group EXCEPT:
All of the following are part of the monitoring and controlling process group EXCEPT:
How many cores are available to the resource pool with a Type I hypervisor that has 4 quad core processors ins
How many cores are available to the resource pool with a Type I hypervisor that has 4 quad core
processors installed?
Which of the following is BEST used to prevent other people from viewing a user’s computer screen?
Which of the following is BEST used to prevent other people from viewing a user’s computer screen?
Which of the following allows an administrator to reference performance and configuration information if there
Which of the following allows an administrator to reference performance and configuration
information if there is a problem on the network?
Which of the following should the technician do NEXT?
During a presentation, a client removes confidential proposal materials from the presenter’s laptop
via an IR connection. This behavior is expressly prohibited by the company. The client’s location in
the audience is immediately identified. Which of the following should the technician do NEXT?
Which of the following uses port 23 by default?
Which of the following uses port 23 by default?
Which of the following should be implemented in order to compliment password usage and smart cards?
Ann, the security administrator, wishes to implement multifactor security. Which of the
following should be implemented in order to compliment password usage and smart cards?