SIMULATION As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following: โ All phishing attempts must be reported. โ Future spam emails to users must be prevented. INSTRUCTIONS Review each email and perform the following within the email: โ Classify the emails โ Identify suspicious items, if applicable, in each email โ Select the appropriate resolution If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Explanation: ee explanation below. Inbox mail 1 - Account Locked - Phishing - Report email to Information Security Inbox mail 2 - Share your feedback - Legitimate - Perform no additional actions Inbox mail 3 โ Employee orientation - Legitimate - Perform no additional actions Inbox mail 4 โ Security Update โ Spam - Report email to Information Security Inbox mail 5 โ Interview - Legitimate - Perform no additional actions
A user reports getting a BSOD error on their computer at least twice a day. Which of the following should the technician use to determine the cause?
A technician is setting up a Windows server to allow remote desktop connections for multiple users. Which of the following should the technician configure on the workstation?
A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?
A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?
Which of the following is used to detect and record access to restricted areas?