Which of the following should the technician do NEXT in…
A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is
related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?
Which of the following would ensure some type of encry…
A company wants to ensure that all aspects if data are protected when sending to other sites within the enterprise. Which of the following would ensure some type
of encryption is performed while data is in transit?
Which of the following should be the FIRST question the…
A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to
the same shared printer. Which of the following should be the FIRST question the helpdesk asks?
Which of the following is a hardware based encryption d…
Which of the following is a hardware based encryption device?
Which of the following should the network technician do…
A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should
the network technician do NEXT?
Which of the following would be used when a higher leve…
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following steps of incident handling has b…
A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a
cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?
Which of the following has a storage root key?
Which of the following has a storage root key?
Which of the following forensics actions should Ann perform?
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected
the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics actions should Ann perform?
Which of the following describes how this private key s…
An SSL/TLS private key is installed on a corporate web proxy in order to inspect HTTPS requests. Which of the following describes how this private key should be
stored so that it is protected from theft?