Which of the following tools would a technician use to BEST resolve this issue?
A user reports that every time they use a search engine and click on a link to go to a website, they
instead are taken to a site blocked by their company’s content filter. The user is not trying to go to
the blocked site and needs to be able to successfully use the search engine to complete their
assignment. Which of the following tools would a technician use to BEST resolve this issue?
Which of the following tools would BEST reset the computer to how it worked when first purchased?
After being infected with a virus, a user’s computer does not recognize the user as having local
administrator rights to the computer. After troubleshooting the issue, a technician determines the
computer needs to be rebuilt and data needs to be restored from the user’s backup. Which of the
following tools would BEST reset the computer to how it worked when first purchased?
Which of the following is BEST used to prevent other people from viewing a user’s computer screen?
Which of the following is BEST used to prevent other people from viewing a user’s computer
screen?
Which of the following security threats almost occurred?
A pest exterminator tries to gain access to a company’s computer lab, but the receptionist does
not see an extermination scheduled on the calendar and denies the exterminator access to the
lab. Which of the following security threats almost occurred?
A computer program that functions normally while quietly installing malicious software on a machine is known a
A computer program that functions normally while quietly installing malicious software on a
machine is known as a:
Which of the following security threats is BEST mitigated through proper user training?
Which of the following security threats is BEST mitigated through proper user training?
The practice of following an authorized person through an entrance without using a badge to defeat security is
The practice of following an authorized person through an entrance without using a badge to
defeat security is called:
which of the following security threats?
Turnstiles and other mantraps will prevent which of the following security threats?
Which of the following encryption standards is found on older wireless devices and provides minimal security?
Which of the following encryption standards is found on older wireless devices and provides
minimal security?
Phishing is:
Phishing is: