Question 221

A company would like to increase its security measures because a workstation was recently hacked. Which of the following would offer the BEST protection from unauthorized access of workstations?
  • Question 222

    Users have reported their files have disappeared, and they are unable to access local data.
    The security administrator quarantined all affected systems and removed any remote connectivity; however, users are still unable to access local data PC performance has not been affected, but the applications keep failing.
    Which of the following has MOST likely occurred?
  • Question 223

    A technician is securing a server room by implementing a two-factor authentication solution.
    Which of the following should the technician implement to provide the BEST security for the server room?
  • Question 224

    A new company policy states that all end-user access to network resources will be controlled based on the users' roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?
  • Question 225

    A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns.
    Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Choose two.)