Which of the following ports should be allowed?
A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the
Internet. Which of the following ports should be allowed?
Which of the following is the BEST solution for securin…
A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the
user does not want to turn off the computer every time in the evening. Which of the following is the BEST
solution for securing the workstation?
Which of the following is the MOST likely reason the fi…
A user wants to save a file into another user’s directory, but the file save is denied. Which of the following is the
MOST likely reason the file save cannot be completed?
which of the following forms of physical security?
A turnstile is an example of which of the following forms of physical security?
Which of the following Windows features would be used t…
Which of the following Windows features would be used to encrypt a single file or folder?
Which of the following prevention methods is considered…
Which of the following prevention methods is considered to be digital security?
Which of the following steps should the technician take…
A technician is configuring a new Windows computer for a home office. Which of the following steps should the
technician take to secure the workstation? (Select TWO).
Which of the following type of potential security threa…
Ann, an executive, reports that she received a call from someone asking for information about her email
account. Which of the following type of potential security threats does this scenario describe?
Which of the following would be the BEST method to use …
A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the
following would be the BEST method to use for disposing of these drives?
Which of the following will help to protect an organiza…
Which of the following will help to protect an organization from further data exposure AFTER a list of user
passwords has already been leaked due to policy breach? (Select TWO).