Question 66

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?
  • Question 67

    Which of the following could be used to implement secure physical access to a data center?
  • Question 68

    A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?
  • Question 69

    A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?
  • Question 70

    Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).