Which of the following steps should the technician take…
A technician is configuring a new Windows computer for a home office. Which of the following steps should the
technician take to secure the workstation? (Select TWO).
Which of the following type of potential security threa…
Ann, an executive, reports that she received a call from someone asking for information about her email
account. Which of the following type of potential security threats does this scenario describe?
Which of the following would be the BEST method to use …
A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the
following would be the BEST method to use for disposing of these drives?
Which of the following will help to protect an organiza…
Which of the following will help to protect an organization from further data exposure AFTER a list of user
passwords has already been leaked due to policy breach? (Select TWO).
Which of the following methods is MOST effective?
A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the
following methods is MOST effective?
Which of the following actions should the technician ta…
A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO
router. The technician has verified that all connections and settings are appropriate. Which of the following
actions should the technician take NEXT?
Which of the following should the technician recommend?
A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the
wireless network. The customer has a small number of devices on the network and does not want to have to
remember a complicated password. Which of the following should the technician recommend?
Which of the following additional settings should the t…
A technician is configuring a SOHO wireless router for a small business with three employees. After the three
employees’ laptops have successfully connected to the wireless network, the company would like to prevent
additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the
following additional settings should the technician change?
Which of the following should the technician do to the …
A technician has upgraded four computers and would like to securely repurpose the hard drives for later use.
Which of the following should the technician do to the drives to prepare them for later use?
which of the following types of screen locks is the MOS…
When securing a mobile device, which of the following types of screen locks is the MOST secure?