لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
A. Acceptable use
B. Chain of custody
C. Security policy
D. Information management
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?
A. Home
B. Pro for Workstations
C. Enterprise
D. Pro
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A technician is investigating an employee’s smartphone that has the following symptoms: – The device is hot even when it is not in use. – Applications crash, especially when others are launched. – Certain applications, such as GPS, are in portrait mode when they should be in landscape mode. Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Choose two.)
A. Turn on autorotation
B. Activate airplane mode
C. Close unnecessary applications
D. Perform a factory reset
E. Update the device’s operating system
F. Reinstall the applications that have crashed
عرض الإجابة
اجابة صحيحة: AB
السؤال #4
Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?
A. Install and run Linux and the required application in a PaaS cloud environment
B. Install and run Linux and the required application as a virtual machine installed under the Windows OS
C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed
D. Set up a dual boot system by selecting the option to install Linux alongside Windows
عرض الإجابة
اجابة صحيحة: B
السؤال #5
A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?
A. Reset the phone to factory settings
B. Uninstall the fraudulent application
C. Increase the data plan limits
D. Disable the mobile hotspot
عرض الإجابة
اجابة صحيحة: C
السؤال #6
An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?
A. Encrypt the files
B. Clone any impacted hard drives
C. Contact the cyber insurance company
D. Inform law enforcement
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: D
السؤال #8
A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Choose two.)
A. Utilizing an ESD strap
B. Disconnecting the computer from the power source
C. Placing the PSU in an antistatic bag
D. Ensuring proper ventilation
E. Removing dust from the ventilation fans
F. Ensuring equipment is grounded
عرض الإجابة
اجابة صحيحة: B
السؤال #9
A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?
A. Consoltf
B. Disk Utility
C. Time Machine
D. FileVault
عرض الإجابة
اجابة صحيحة: B
السؤال #10
A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?
A. Data-in-transit encryption
B. Disk encryption
C. USB drive encryption
D. File encryption
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: