Question 256
Which of the following social engineering vulnerabilities occurs when someone follows a technician into a server room without using a key card?
Question 257
Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
Question 258
Which of the following tools should the technician use to analyze the computer's behavior?
Question 259
After connecting to the corporate VPN, a user's workstation is no longer to browse Internet websites. A technician discovers launching a different web browser on the same computer reaches the websites correctly.
Which of the following should the technician do NEXT?
Which of the following should the technician do NEXT?
Question 260
A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which of the following should the technician monitor during the installation?