Which of the following is the BEST way to verify that the file has not been modified?
A user needs to verify that a patch file downloaded from a third party has not been modified since the time that the original manufacturer released the patch. Which of the following is the BEST way to verify that the file has not been modified?
Which of the following should be checked FIRST?
An intrusion has been detected on a company’s network from the Internet. Which of the following should be checked FIRST?
Which of the following BEST describes what to check FIRST?
A user reports that a web based application is not working after a browser upgrade. Before the upgrade, a login box would appear on the screen and disappear after login. The login box does not appear after the upgrade. Which of the following BEST describes what to check FIRST?
Which of the following should an administrator check FIRST in order to prove or disprove this claim?
A user is convinced that someone is attempting to use their user account at night. Which of the following should an administrator check FIRST in order to prove or disprove this claim?
Which of the following is the FIRST action for the technician to take?
A user is denied access to a file. The user had access to the file yesterday. Which of the following is the FIRST action for the technician to take?
Which of the following allows a technician to view the security permissions of a file?
Which of the following allows a technician to view the security permissions of a file?
Which of the following uses a sandbox to manage a programs ability to access system resources?
Which of the following uses a sandbox to manage a programs ability to access system resources?
Which of the following should the administrator check FIRST?
A user complains that the color laser printer continuously gives an access denied message while attempting to print a text document. The administrator logs onto the PC and prints successfully. Which of the following should the administrator check FIRST?
Which of the following is this an example of?
A company decides that the purchasing agent and the accounts receivable agent should exchange positions in order to allow for more oversight of past transactions. Which of the following is this an example of?
Which of the following is this an example of?
A DMZ has a fake network that a hacker is attacking. Which of the following is this an example of?