A worker in the records department of a hospital in the United States accidentally sends a patient’s medical record to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. Which two types of compliance standards best match the breach of confidentiality? (Choose two.)

  • PHI
  • ePHI

A technician is attempting to securely configure a Linux web server on the public-facing side of the firewall. What port type and number are most likely required to be open on the firewall to allow this traffic through?

  • TCP port 22

A system administrator needs to perform manual updates on a remote Linux workstation using a Windows 10 PC. Which remote access tool should the administrator use to securely access and configure the Linux device across the network?

  • SSH client

A programmer used an operator to compare values within a program and the resulting logical data type was “false”. Which test condition would have provided the result of “false”?

  • 8 != 8
Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.)
  • C#
  • Java
What is a common responsibility of a level one call center technician?
  • entering a concise description of a customer problem into a ticketing system

A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?

  • antimalware

A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?

  • antimalware

A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?

  • antimalware

A technician has been asked by a manager to recommend a security solution for protecting a computer against keyloggers. Which security technique should the technician recommend?

  • antimalware

A technician has been asked by a manager to recommend a security solution for protecting a computer against spyware. Which security technique should the technician recommend?

  • antimalware

A technician has been asked by a manager to recommend a security solution for protecting a computer against ransomware. Which security technique should the technician recommend?

  • antimalware

A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend?

  • antimalware

A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?

  • Limit the login times.
Which two statements characterize wireless network security? (Choose two.)
  • With SSID broadcast disabled, an attacker must know the SSID to connect.
  • Using the default IP address on an access point makes hacking easier.

A newly created company has fifteen Windows 10 computers that need to be installed before the company can open for business. What is a best practice that the technician should implement when configuring the Windows Firewall?

  • After implementing third party security software for the company, the technician should verify that the Windows Firewall is disabled.

An IT technician wants to create a rule on two Windows 10 computers to prevent an installed application from accessing the public Internet. Which tool would the technician use to accomplish this task?

  • Security
A technician is configuring rights and permissions in Windows 7. Which tool will the technician use?
  • Local Users and Groups