which of the following should the technician do?
A technician is configuring a PC that will have confidential information stored on it. To ensure that
only authorized users can access this PC, which of the following should the technician do? (Select
TWO).
Which of the following should the technician do?
A company recently had a security breach and is now required to increase the security on their
workstations. A technician has been tasked to harden all the workstations on the network. Which
of the following should the technician do?
which of the following security threats?
A user receives a phone call from a person claiming to be from technical support. This person
knows the user’s name and that the user has Windows installed on their computer. The technician
directs the user to open Event Viewer and look at some event log entries to demonstrate the
effects of a virus on the computer. The technician also asks the user for their user ID and
password so that they can clean the computer. This is an example of which of the following
security threats?
Which of the following should be done to BEST secure the router from unauthorized access?
A user has just purchased a wireless router for their home. Which of the following should be done
to BEST secure the router from unauthorized access? (Select TWO).
Which of the following should the technician perform NEXT?
A user is experiencing slow performance with their computer. A technician suspects the computer
has a virus and runs antivirus software. A virus is found and removed, but the performance issue
is not resolved. Which of the following should the technician perform NEXT?
The benefit of MAC filtering in wireless networking is that the network:
The benefit of MAC filtering in wireless networking is that the network:
which of the following should be changed FIRST?
When securing a new wireless router, which of the following should be changed FIRST?
Which of the following should the technician perform FIRST before spyware removal?
A client has a computer that is infected with several viruses and spyware. Which of the following
should the technician perform FIRST before spyware removal?
Which of the following utilities should the technician use to identify the criteria?
A technician is trying to setup a non-domain user account on a workstation, but receives the
following error message “Password does not meet the complexity requirements.” Which of the
following utilities should the technician use to identify the criteria?
which of the following prevents unauthorized users from accessing confidential data?
In a SOHO wireless network, which of the following prevents unauthorized users from accessing
confidential data?