Which of the following are examples of digital security?
Which of the following are examples of digital security? (Select TWO).
An unauthorized user observing system security procedures is known as:
An unauthorized user observing system security procedures is known as:
Which of the following would be the MOST appropriate response for this customer?
A first time PC owner drops off their brand new PC for service, reporting that it is slow and
the memory should be 12GB according to the box but only reports 4GB. The RAM voltage
was set improperly; one chip needed to be reseated and the BIOS had to be set to use the
triple channel architecture. When picking up the PC the customer asks what was wrong.
Which of the following would be the MOST appropriate response for this customer?
Which of the following should the technician do FIRST?
A customer, Joe, has a corporate laptop that his teenage son used over the weekend. He
thinks the laptop now has illegal material because of strange websites on his browser’s
home page. Joe brings the laptop to the repair center. Which of the following should the
technician do FIRST?
Which of the following is BEST to perform to keep this device off the network?
An unknown device has been found on a SOHO wireless router. Which of the following is
BEST to perform to keep this device off the network?
which of the following security risks?
Privacy filters applied to users computer screens are used to combat which of the following
security risks?
Which of the following settings would a technician change in the BIOS?
A technician would like to load an operating system CD on startup. Which of the following
settings would a technician change in the BIOS?
which of the following should be performed?
A technician needs to move servers from the storage room. When it comes to personal
safety, which of the following should be performed?
Which of the following is the BEST way to delete the data?
A technician needs to securely delete all data from a hard drive containing highly sensitive
information. Which of the following is the BEST way to delete the data?
Which of the following is solely designed to avoid detection by an antivirus program by using the underlying o
Which of the following is solely designed to avoid detection by an antivirus program by using
the underlying operating system to its advantage?