A business lost all data and equipment after a disaster. Due to the disaster, the business no longer maintains system backups. Which of the following should the business implement to prevent future losses?
Answer : D
Comprehensive and Detailed In-Depth
Cloud storage ensures that data is backed up off-site, protecting against physical disasters like fires or floods.
A . Test environment -- Incorrect. This is for software testing, not data recovery.
B . Local backups -- Incorrect. These could also be destroyed in a disaster.
C . Cold site -- Useful for disaster recovery but does not automatically back up data.
CompTIA A+ 220-1102, Objective 4.1 -- Backup and Recovery Best Practices
A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?
Answer : C
The risk analysis should be performed before it's taken to the board. The step after the board approves the change is End User Agreenment Reference: https://www.youtube.com/watch?v=Ru77iZxuElA&list=PLG49S3nxzAnna96gzhJrzkii4hH_mgW4b&index=59
A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company's risk to avoid any issues. Which of the following items should the technician implement?
Answer : C
Anti-phishing training is a method of educating users on how to identify and avoid phishing attacks, which are attempts to trick users into revealing sensitive information or performing malicious actions by impersonating legitimate entities or persons. Whaling attacks are a specific type of phishing attack that target high-level executives or influential individuals within an organization. Anti-phishing training can help users recognize the signs of whaling attacks and prevent them from falling victim to them. Screened subnet, firewall, and antivirus are not items that can directly address the issue of whaling attacks.
A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting. Which of the following should the technician use to assist the user?
Answer : D
The best tool to use to assist the user with viewing the email isRMM, which stands forremote monitoring and management. This is a software that allows the technician to remotely access, monitor, and manage the user's computer and applications. The technician can use RMM to view the user's screen, control the mouse and keyboard, and troubleshoot the email issue. The other tools are not suitable for this task.VNCis a software that allows remote desktop sharing, but it requires the user to install and configure it on their computer, which may not be feasible or convenient.SSHis a protocol that allows secure remote access to a command-line interface, but it is not useful for viewing graphical applications such as email.VPNis a technology that creates a secure and encrypted connection over a public network, but it does not provide remote access or control of the user's computer.
A system drive is nearly full, and a technician needs to free up some space. Which of the following tools should the technician use?
Answer : A
A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?
Answer : D
Chain of custody is a legal term that refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence1. It is important in forensic investigations to establish that the evidence is in fact related to the case, and that it has not been tampered with or contaminated.A technician needs to track evidence for a forensic investigation on a Windows computer by following the proper procedures for collecting, handling, storing, and analyzing the evidence, and documenting every step of the process on a chain of custody form23
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?
Answer : C
The most effective way to check other machines on the network for this unknown threat is to manually check each machine. This can help to identify any other machines that may be infected with the unknown virus and allow them to be cleaned.