Topic 1: Exam Pool A
A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).
A. Prevent a device root
B. Disable biometric authentication
C. Require a PIN on the unlock screen
D. Enable developer mode
E. Block a third-party application installation
F. Prevent GPS spoofing
Explanation:
To help secure the device against this threat in the future, the administrator should require
a PIN on the unlock screen and block a third-party application installation. Requiring a PIN
on the unlock screen can help to prevent unauthorized access to the device, while blocking
third-party application installation can help to prevent malicious applications from being
installed on the device.
A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?
A. Valid license
B. Data retention requirements
C. Material safety data sheet
D. Chain of custody
Explanation: Chain of custody is a legal term that refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence1. It is important in forensic investigations to establish that the evidence is in fact related to the case, and that it has not been tampered with or contaminated. A technician needs to track evidence for a forensic investigation on a Windows computer by following the proper procedures for collecting, handling, storing, and analyzing the evidence, and documenting every step of the process on a chain of custody form23
Which of the following is the most likely to use NTFS as the native filesystem?
A. macOS
B. Linux
C. Windows
D. Android
A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?
A. Shut down the infected computer and swap it with another computer
B. Investigate what the interface is and what triggered it to pop up
C. Proceed with initiating a full scan and removal of the viruses using the presented interface
D. Call the phone number displayed in the interface of the antivirus removal tool
Explanation:
The technician should not proceed with initiating a full scan and removal of the viruses
using the presented interface or call the phone number displayed in the interface of the
antivirus removal tool12.
Shutting down the infected computer and swapping it with another computer is not
necessary at this point12.
The technician should not immediately assume that the message is legitimate or perform
any actions without knowing what the interface is and what triggered it to pop up. It is
important to investigate the issue further, including checking the legitimacy of the antivirus
program and the message it is displaying.
A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?
A. VNC
B. RMM
C. RDP
D. SSH
Page 20 out of 148 Pages |
Previous |