1. A technician has contacted a vendor, informing them they need to RMA a faulty memory stick. Which of the following should the technician use to BEST protect this component from further damage during shipment?
A) A. Anti-static bags B) B. Plastic box C) C. Cardboard box D) D. Bubble wrap E) E. Padded envelope
2. A company has drivers with PII and other sensitive information on them. There are several drives that need to be disposed of in a short time due to federal regulations, so a technician hires a media destruction company to perform the work. Which of the following should be requested from the company?
A) A. Copy of the contract for the completed work B) B. Certificate for a Certificate Authority C) C. Certificate of destruction D) D. Receipt of payment for work completed
3. A technician is troubleshooting a startup failure on a Windows domain controller DNS service. The technician discovers a third-party application is running a database server application that happens to capture the same high-numbered ports as the DNS service. The application service ports cannot be changed due to application design. Which of the following is the BEST solution to resolve this problem?
A) A. Allow the database application to start up first, and set the DNS service to delayed start B) B. Allow the DNS server service to start up first, and set the application service to delayed start C) C. Move the third-party database application to a different domain controller D) D. Contact the application vendor to find out if the ports it uses can be changed
4. Which of the following technologies ensures full device encryption on a Windows mobile device?
A) A. BitLocker B) B. UEFI C) C. TPM D) D. Passcode
5. A user has become a victim of data harvesting. The user wants to know more about the potential for mobile device application security issues. Which of the following settings should a technician advise the user to change on the user-s mobile device? (Select three.)(Select 2answers)
A) A. Location tracking B) B. Camera activation C) C. Data transmission limit D) D. System lockouts E) E. Developer options F) F. Accessibility
Leave a comment