Topic 1: Exam Pool A
A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method
A. Reinstalling Windows
B. Performing a quick format
C. Using disk-wiping software
D. Deleting all files from command-line interface
Explanation:
Using disk-wiping software is the most secure method for removing information from past
users’ hard drives in order to reuse the hard drives. Disk-wiping software can help to
ensure that all data on the hard drive is completely erased and cannot be recovered.
Which of the following is also known as something you know, something you have, and something you are? ACL
A. MFA
B. SMS
C. NFC
Explanation:
MFA stands for Multi-Factor Authentication, which is a method of verifying a user’s identity using two or more different factors of authentication. The three factors of authentication are something you know, something you have, and something you are. These factors correspond to different types of information or evidence that only the legitimate user should possess or provide. For example:
Something you know: a password, a PIN, a security question, etc.
Something you have: a smart card, a token, a mobile device, etc. Something you are: a fingerprint, a face, an iris, etc.
MFA provides a higher level of security than single-factor authentication, which only uses one factor, such as a password. MFA reduces the risk of unauthorized access, identity theft, and data breaches, as an attacker would need to compromise more than one factor to impersonate a user. MFA is commonly used for online banking, email accounts, cloud services, and other sensitive applications
A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?
A. Privacy
B. Indexing Options
C. System
D. Device Manager
Explanation:
To exclude an application folder from being cataloged by a Windows 10 search, the
technician should use the Indexing Options utility1.
An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices? Devices and Printers
A. Ease of Access
B. Programs and Features
C. Device Manager
A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?
A. Encrypting File System
B. FileVault
C. BitLocker
D. Encrypted LVM
Explanation:
The encryption solution that the technician should choose when configuring a new
Windows laptop and corporate policy requires that mobile devices make use of full disk
encryption at all times is BitLocker. This is because BitLocker is a full-disk encryption
feature that encrypts all data on a hard drive and is included with Window
Page 21 out of 148 Pages |
Previous |