Which of the following types of social engineering attacks sends an unsolicited text message to a user ' s mobile device?
Which of the following is used to detect and record access to restricted areas?
An end user is unable to access the intranet. A technician needs to confirm whether the Windows web server is online and functioning. Which of the following default remote access technologies would the technician most likely use to remotely connect to the server?
An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?
A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?
A user ' s new smartphone is not staying charged throughout the day. The smartphone charges fully every night. Which of the following should a technician review first to troubleshoot the issue?
A technician is setting up a surveillance system for a customer. The customer wants access to the system ' s web interface on the LAN via the system’s IP address. Which of the following should the technician use to prevent external log-in attempts from the internet?
A town clerk wants to work from home and access documents on a town hall server. What should a technician set up?
A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?