1.
A Mac user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?
2.
A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?
3.
A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running.
The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT?
4.
With which of the following types is a man-in-the-middle attack associated?
5.
An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?