FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?
A
identification and authentication policy
B
incident handling policy
C
acceptable use policy
D
remote access policy
Explanation: 

Detailed explanation-1: -What policy should the technician implement after the security breach has occurred? Answers Explanation & Hints: A company security policy commonly contains incident handling procedures used when a security breach occurs.

Detailed explanation-2: -When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket? Ensure that all applications are working.

Detailed explanation-3: -What approach should a technician take when receiving a call from a stressed customer? Try to establish a rapport with the customer.

Detailed explanation-4: -What task should be completed before escalating a problem to a higher-level technician? Document each test that was tried.

Detailed explanation-5: -Which website should a technician consult to find instructions for updating the BIOS on a computer? Answers Explanation & Hints: Go to the motherboard manufacturer site to get the correct software to update the BIOS.

There is 1 question to complete.