Which of the following data destruction methods would be MOST secure for highly sensitive information?
A company is looking to donate a collection of old PCs that are no longer needed. Which of the
following data destruction methods would be MOST secure for highly sensitive information?
Which of the following attacks is this user a victim of?
A user receives an unsolicited call from a technician claiming to be from a Microsoft certified
partner. The technician tricks the user into allowing them access to their PC because of malware
alerts that were being broadcasted. Which of the following attacks is this user a victim of?
Which of the following technologies would help RIS install this image?
A user’s PC breaks and a technician needs to configure a new machine with a copy of their computer
image stored on a remote server. Which of the following technologies would help RIS install this
image?
Which of the following identifies traffic based upon its physical network address?
Which of the following identifies traffic based upon its physical network address?
Which of the following should be implemented?
A technician must secure company documents from accidental disclosure. Which of the following
should be implemented? (Select TWO).
Which of the following is TRUE about the difference between a worm and a virus?
Which of the following is TRUE about the difference between a worm and a virus?
Which of the following should the technician perform NEXT to improve the security of the SOHO network?
A technician is tasked with improving the security of a SOHO network. The office is comprised of a
single wireless router located under the front desk where the office manager sits. All desktop
computers are wired into the router which is configured with strong device credentials. Additionally,
wireless is disabled on the router. Which of the following should the technician perform NEXT to
improve the security of the SOHO network?
Which of the following administrative tools would accomplish this?
A technician is setting up automatic login to desktop for a non-domain Windows XP system. Which
of the following administrative tools would accomplish this?
Which of the following issues is MOST likely affecting the smartphone?
A user calls the help desk to report about their smartphone not being able to make any phone calls.
The user admits that the smartphone can still send/receive email, browse all websites, and utilize all
Internet-capable applications. Which of the following issues is MOST likely affecting the
smartphone?
what is wrong with the computer?
A technician is troubleshooting a customer’s computer that will not turn on. The user stated that the
computer was working fine until there was a thunderstorm the other night. Which of the following
tools would the technician use to determine what is wrong with the computer?