Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?
Correct Answer:A
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter āJā assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?
Correct Answer:A
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.
Which of the following security measures should be used?
Correct Answer:D
A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network Which of the following best practices could have prevented the attack?
Correct Answer:D
A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?
Correct Answer:D