COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
identification and authentication policy
|
|
incident handling policy
|
|
acceptable use policy
|
|
remote access policy
|
Detailed explanation-1: -What policy should the technician implement after the security breach has occurred? Answers Explanation & Hints: A company security policy commonly contains incident handling procedures used when a security breach occurs.
Detailed explanation-2: -When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket? Ensure that all applications are working.
Detailed explanation-3: -What approach should a technician take when receiving a call from a stressed customer? Try to establish a rapport with the customer.
Detailed explanation-4: -What task should be completed before escalating a problem to a higher-level technician? Document each test that was tried.
Detailed explanation-5: -Which website should a technician consult to find instructions for updating the BIOS on a computer? Answers Explanation & Hints: Go to the motherboard manufacturer site to get the correct software to update the BIOS.