220-1002 Exam Question 31

Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files.
He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?
  • 220-1002 Exam Question 32

    A technician is installing a private PC in a public workspace.
    Which of the following password practices should the technician implement on the PC to secure network access?
  • 220-1002 Exam Question 33

    Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?
  • 220-1002 Exam Question 34

    A user installed an application that now requires a license key to enable lull functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user. Which of the following will support this task''
  • 220-1002 Exam Question 35

    A technician logs on to a Linux computer and runs the following command:
    ps -aux | grep vi
    Which of the following MOST accurately describes the effect of the command?