Which of the following is the MOST secure method, short of physical destruction, that would be used to ensure
Which of the following is the MOST secure method, short of physical destruction, that would be
used to ensure that data on a hard drive cannot be recovered?
Which of the following security policies can be implemented in order to prevent this situation?
IT suspects that other people are frequently making changes to a computer when a user leaves
their desk. Which of the following security policies can be implemented in order to prevent this
situation?
Which of the following would be the BEST response from the technician?
A client has asked a technician about drive sanitation and wants to know what the difference is
between overwriting a drive and formatting a drive. Which of the following would be the BEST
response from the technician?
Which of the following BEST describes the security term known as tailgating?
Which of the following BEST describes the security term known as tailgating?
Which of the following should a technician check FIRST?
A user is reporting that they are clicking on search results and being redirected to the wrong sites.
Which of the following should a technician check FIRST?
which of the following actions should the technician take FIRST in order to secure the network?
When setting up a new wireless router, which of the following actions should the technician take
FIRST in order to secure the network? (Select TWO).
Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?
Which of the following allows a hidden backdoor to be used for access to workstations on the
Internet?
Which of the following ports should be opened to allow POP3 mail traffic through the firewall?
While configuring a new email application that uses POP3 for a customer, the technician
determines the firewall is blocking the traffic. Which of the following ports should be opened to
allow POP3 mail traffic through the firewall?
Which of the following would the technician configure to allow the user to access email on the Android tablet?
A user just bought an Android tablet and wants to connect to their work email. The user’s
employer has a Microsoft Exchange server for email. Which of the following would the technician
configure to allow the user to access email on the Android tablet?
Which of the following would a technician use to install applications onto an iPad?
Which of the following would a technician use to install applications onto an iPad? (Select TWO).