Which of the following security threats is defined by its self propagating characteristic?
Which of the following security threats is defined by its self propagating characteristic?
Which of the following cable types is used to prevent exposure to toxins in the event of a fire?
Which of the following cable types is used to prevent exposure to toxins in the event of a
fire?
Which of the following would BEST accomplish this?
A small business owner is setting up their wireless network in their office, which is in a
building shared with several other businesses. The owner does not want to disable the SSID
broadcasting due to visiting customers needing to use the network, but does not want other
businesses to notice the network, let alone access it. Which of the following would BEST
accomplish this?
Which of the following should a technician implement to prevent external contractors from physically plugging
Which of the following should a technician implement to prevent external contractors from
physically plugging devices into the company’s network jacks unless such jacks are
designated for guest use?
which of the following ports is used for DNS?
By default, which of the following ports is used for DNS?
Which of the following would BEST prevent this?
An administrator is concerned about users accessing network shares outside of their job
role.
Which of the following would BEST prevent this?
which of the following types of printers should this maintenance kit be installed?
A technician receives a maintenance kit in the mail for a printer. The maintenance kit
contains a fuser, a pickup roller, and four paper rollers. Into which of the following types of
printers should this maintenance kit be installed?
Which of the following data destruction methods would be MOST secure for highly sensitive information?
A company is looking to donate a collection of old PCs that are no longer needed. Which of
the following data destruction methods would be MOST secure for highly sensitive
information?
Which of the following should she consider FIRST?
A local low broadcast television station has asked Ann, a technician, to build a computer that
can be used to create commercials. Which of the following should she consider FIRST?
Which of the following attacks is this user a victim of?
A user receives an unsolicited call from a technician claiming to be from a Microsoft certified
partner. The technician tricks the user into allowing them access to their PC because of
malware alerts that were being broadcasted. Which of the following attacks is this user a
victim of?