Which of the following steps will he take to determine the version of the BIOS?
Andrew purchases a laptop that has the Windows 2000 Professional operating system. He wants to know
about the BIOS version of the computer. Which of the following steps will he take to determine the version
of the BIOS?
Each correct answer represents a part of the solution. Choose two.
Which of the following is a best practice in end user security?
A security manager is developing new policies and procedures. Which of the following is a best
practice in end user security?
which of the following can BEST reduce the likelihood of related legal issues?
If a technician must take an employee’s workstation into custody in response to an investigation,
which of the following can BEST reduce the likelihood of related legal issues?
Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on files whil
Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on
files while copying the files?
Which of the following provides the MOST comprehensive method for reducing the time to recover?
An organization has had six security incidents over the past year against their main web
application. Each time the organization was able to determine the cause of the incident and
restore operations within a few hours to a few days. Which of the following provides the MOST
comprehensive method for reducing the time to recover?
Which of the following switches is used with the XCOPY command to copy directories and subdirectories, includi
Which of the following switches is used with the XCOPY command to copy directories and subdirectories,
including empty directories?
Which of the following presents the MOST risk to confidentiality in this scenario?
A company runs large computing jobs only during the overnight hours. To minimize the amount of
capital investment in equipment, the company relies on the elastic computing services of a major
cloud computing vendor. Because the virtual resources are created and destroyed on the fly
across a large pool of shared resources, the company never knows which specific hardware
platforms will be used from night to night. Which of the following presents the MOST risk to
confidentiality in this scenario?
Which of the following security items should the company have in place before implementation?
A business wants to start using social media to promote the corporation and to ensure that
customers have a good experience with their products. Which of the following security items
should the company have in place before implementation? (Select TWO).
Which of the following switches of the XCOPY command continues to copy files even if errors occur?
Which of the following switches of the XCOPY command continues to copy files even if errors occur?
Which of the following are management challenges and risks associated with this style of technology lifecycle
An administrator at a small company replaces servers whenever budget money becomes
available. Over the past several years the company has acquired and still uses 20 servers and 50
desktops from five different computer manufacturers. Which of the following are management
challenges and risks associated with this style of technology lifecycle management?
