Question 216
Which of the following forms of regulated data is MOST important to consider when browsing e-commerce sites on the Internet?
Question 217
A technician wants to deploy a solution to manage a computer remotely. The technician is not allowed to modify any network configuration and is not able to forward any ports on the router to internal devices. Which of the following remote access technologies would be BEST suited for this situation?
Question 218
A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.
Which of the following BEST enforces this policy?
Which of the following BEST enforces this policy?
Question 219
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as
"ConnectMe" and appears as unsecure. Which of the following should the help desk perform to fix the issue?
"ConnectMe" and appears as unsecure. Which of the following should the help desk perform to fix the issue?
Question 220
A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the
BEST choice for the technician to make?
BEST choice for the technician to make?