A technician receives a trouble ticket that Joe, a wireless customer, cannot access his email. As part of the troubleshooting process, the technician gathered information and identified the symptoms. Which of the following is the NEXT logical step in troubleshooting?
A. Test the theory
B. Document findings and outcomes
C. Establish a theory to determine the cause
D. Implement the solution
Which of the following methods would MOST likely prevent a laptop from being booted without the correct key or password?
A. File level encryption
B. Full-disk encryption
C. Folder level encryption
D. Removable media encryption
Malicious software that is designed to appear as a legitimate program would be defined as a:
A. trojan.
B. DDoS.
C. rogue access point.
D. man-in-the-middle attack.
Ann, an attacker, has spoofed a mobile device serial number so she can connect to the MDM environment. Which of the following would an administrator check to uncover this attack?
A. Review the SIEM logs on a corporate network to determine authentication issues
B. Review certificate revocations by the MDM
C. Review connection attempts to the network from that phone's serial number
D. Review recent connection locations, looking for an abnormal location
Which of the following is a capability of geo-fencing?
A. Enable SDLC on device
B. Disable corporate firewall
C. Enable POE-injector of device
D. Disable camera on device
A replicated network at another location is used as part of which of the following?
A. Network backhauling
B. RAID 1
C. Incident response
D. Disaster recovery
A solution which tracks and organizes the usage and cost of voice and data is referred to as:
A. TEM.
B. MaaS.
C. SaaS.
D. B2B.
Ann, a user, reports that her calendar is always an hour different than actual time. Which of the following would cause this issue?
A. Calendar sync
B. Time zone
C. Connection to mail server
D. Battery level
Which of the following protocols is used for dynamic addressing?
A. DHCP
B. DNS
C. NAT
D. SMTP
The board members of a financial institution have been supplied with tablets to conduct their annual meeting. Information discussed in the board room is sensitive in nature and should not be allowed onto the Internet. The operating system on the tablets has been updated to backup all information to the cloud. Which of the following would allow the administrator to learn about this feature before the meeting takes place in one week?
A. The vendor's technical weekly review
B. An annual security conference that occurs in two weeks
C. The vendor's monthly magazine
D. The vendor's daily feature announcement