Question 66
A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?
Question 67
Which of the following could be used to implement secure physical access to a data center?
Question 68
A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?
Question 69
A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?
Question 70
Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).