A) A network worm
B) A new web browser was installed.
C) A new browser add-on was installed.
D) A redirect virus.
Correct Answer
verified
Multiple Choice
A) Run memory diagnostics.
B) Download a CPU diagnostic program.
C) Run a virus scan.
D) Refresh Windows.
Correct Answer
verified
Multiple Choice
A) Zombie
B) Rootkit
C) Spyware
D) Ransomware
Correct Answer
verified
Multiple Choice
A) Spear phishing
B) Impersonation
C) Shoulder surfing
D) Tailgating
Correct Answer
verified
Multiple Choice
A) Key fobs
B) Smart cards
C) Biometric locks
D) Hardware tokens
Correct Answer
verified
Multiple Choice
A) Enable a firewall.
B) Enable a spam filter.
C) Enable port forwarding.
D) Enable MAC filtering.
Correct Answer
verified
Multiple Choice
A) PII
B) PHI
C) PCI
D) GDPR
Correct Answer
verified
Multiple Choice
A) Enable the firewall.
B) Enable the spam filter.
C) Enable port forwarding.
D) Enable MAC filtering.
Correct Answer
verified
Multiple Choice
A) Zero-day
B) DDoS
C) Brute force
D) Man-in-the-middle
Correct Answer
verified
Multiple Choice
A) PII
B) PHI
C) PCI
D) GDPR
Correct Answer
verified
Multiple Choice
A) Acquire a copyright.
B) Obtain an EULA.
C) Use DRM.
D) Issue a license.
Correct Answer
verified
Multiple Choice
A) Try to install in Safe Mode.
B) Try to install in Windows RE.
C) Try to install in Windows PowerShell.
D) Create a virtual machine and install the anti-malware program.
Correct Answer
verified
Multiple Choice
A) Action Center
B) Certificate Manager
C) Windows Security
D) Windows Defender
Correct Answer
verified
Multiple Choice
A) Network topology diagram
B) Knowledge database
C) Inventory management documentation
D) Acceptable use documentation
Correct Answer
verified
Multiple Choice
A) Reinstall Windows.
B) Reinstall the network drivers.
C) Reinstall the security certificate.
D) Remove malware.
Correct Answer
verified
Multiple Choice
A) Action Center
B) Event Viewer
C) Certificate Manager
D) Windows Defender
Correct Answer
verified
Multiple Choice
A) RADIUS+
B) TACACS+
C) AES
D) WPA2
Correct Answer
verified
Multiple Choice
A) Key components of the change and how they will be addressed
B) Risk or problems that might arise during the change
C) Skill sets, tasks, and activities required to carry out the change
D) A plan in case something happens and the change cannot be executed
E) Who will participate in the change
F) How the success of the change will be measured
Correct Answer
verified
Multiple Choice
A) VPN
B) Firewall
C) Access control list
D) MDM policies
Correct Answer
verified
Multiple Choice
A) The computer might need more RAM.
B) The computer might need a processor update.
C) The computer might have a virus.
D) The computer might need to have Windows refreshed.
Correct Answer
verified
Showing 1 - 20 of 71
Related Exams