Question 231

A new policy requires all users to log on to their corporate workstations using smart card authentication.
Which of the following best practices should be implemented to further secure access to workstations?
  • Question 232

    Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.
    Which of the following is MOST likely the cause?
  • Question 233

    Which of the following threats uses personalized information in an attempt at obtaining information?
  • Question 234

    A technician is servicing a workstation that needs a hard drive replacement.
    To protect the workstation, which of the following should the technician use?
  • Question 235

    A technician has completed troubleshooting and repairing a newly found bug on a user's workstation. The technician wants to share the repair steps with the rest of the team. Which of the following methods will the technician MOST likely use?