Question 221
A company would like to increase its security measures because a workstation was recently hacked. Which of the following would offer the BEST protection from unauthorized access of workstations?
Question 222
Users have reported their files have disappeared, and they are unable to access local data.
The security administrator quarantined all affected systems and removed any remote connectivity; however, users are still unable to access local data PC performance has not been affected, but the applications keep failing.
Which of the following has MOST likely occurred?
The security administrator quarantined all affected systems and removed any remote connectivity; however, users are still unable to access local data PC performance has not been affected, but the applications keep failing.
Which of the following has MOST likely occurred?
Question 223
A technician is securing a server room by implementing a two-factor authentication solution.
Which of the following should the technician implement to provide the BEST security for the server room?
Which of the following should the technician implement to provide the BEST security for the server room?
Question 224
A new company policy states that all end-user access to network resources will be controlled based on the users' roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?
Question 225
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns.
Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Choose two.)
Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Choose two.)