A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?
Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe?
A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? (SelectTWO).
Which of the following prevention methods is considered to be digital security?
Which of the following Windows features would be used to encrypt a single file or folder?
A technician is instructed to configure a new workstation to boot the OS from the network. The technician must enable which of the following FIRST?