A) Key fob
B) Smart card
C) Biometric lock
D) Hardware token
Correct Answer
verified
Multiple Choice
A) Run antivirus software.
B) Disconnect from the network.
C) Refresh Windows.
D) Roll back to a previous restore point.
E) Check the file permissions.
Correct Answer
verified
Multiple Choice
A) AES
B) WPA2
C) RADIUS+
D) TACACS+
Correct Answer
verified
Multiple Choice
A) Botnet
B) Spyware
C) Zero-day
D) DDoS
Correct Answer
verified
Multiple Choice
A) TKIP
B) WPA2
C) WEP
D) RADIUS
Correct Answer
verified
Multiple Choice
A) Ignore the violation.
B) Report the incident through the proper channels.
C) Ask the user about the violation.
D) Tell your coworkers what you found.
Correct Answer
verified
Multiple Choice
A) Susan would need to purchase the software from the company.
B) Lance purchased the software for work and can share it with coworkers.
C) The software is open source, so Lance can share the software with Susan.
D) The software was purchase by Lance with a site license and can be used by Susan.
Correct Answer
verified
Multiple Choice
A) Risk analysis
B) Scope of plan
C) Purpose of change
D) Back-out plan
Correct Answer
verified
Multiple Choice
A) Yes, this is open source software.
B) Yes, because she purchased the software.
C) No, this is only for Peggy's computer.
D) No, even though she purchased the software, it was one copy for one computer.
Correct Answer
verified
Multiple Choice
A) Rainbow table
B) Dictionary
C) Zero-day
D) Phishing
Correct Answer
verified
Multiple Choice
A) Incident documentation
B) Chain of custody
C) A backup of the data
D) Private property laws
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Regulatory and compliance policy
C) Knowledge base
D) Password policy
Correct Answer
verified
Multiple Choice
A) Spam
B) Corrupt hard drive
C) Bad hard drive driver
D) Computer virus
Correct Answer
verified
Multiple Choice
A) Install Windows updates.
B) Update malware drivers.
C) Update malware software.
D) Update malware signatures.
Correct Answer
verified
Multiple Choice
A) Scope of change
B) Out of scope modification
C) Change modification
D) Request for comments
Correct Answer
verified
Multiple Choice
A) Copyright
B) EULA
C) DRM
D) Issue a license
Correct Answer
verified
Multiple Choice
A) Back-out plan
B) Plan for change
C) Risk analysis
D) Change analysis plan
Correct Answer
verified
Multiple Choice
A) Trojan
B) Ransomware
C) Rootkit
D) Virus
Correct Answer
verified
Multiple Choice
A) Disable System Protection.
B) Back up the restore point.
C) Enable System Protection.
D) Run the antivirus software on a restore point.
Correct Answer
verified
Multiple Choice
A) Run anti-malware program.
B) Roll back to a previous date.
C) Quarantine the system.
D) Remediate the infected system.
Correct Answer
verified
Showing 21 - 40 of 71
Related Exams