Which of the following should the technician recommend?
A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small
number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend?
Which of the following additional settings should the t…
A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees’ laptops have successfully connected to
the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of
the following additional settings should the technician change?
Which of the following should the technician do to the …
A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the
drives to prepare them for later use?
which of the following types of screen locks is the MOS…
When securing a mobile device, which of the following types of screen locks is the MOST secure?
Which of the following file systems is causing this to …
A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in the user’s My Documents folder cannot be copied. Some
files in question have green letters in the filenames. Which of the following file systems is causing this to occur?
which of the following?
Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new
content. Joe is the victim of which of the following?
The type of security threat that uses computers or othe…
The type of security threat that uses computers or other networks to accept and pass on viruses is called:
Which of the following is the FIRST step in implementin…
A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following
is the FIRST step in implementing a best practice security policy?
Which of the following should be done NEXT?
A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?
Which of the following is the MOST likely cause of this…
An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?