Which of the following tools would the technician use t…
A user reports that any URL entered redirects to the same web page. A technician concludes that the user’s
computer has been compromised. Which of the following tools would the technician use to resolve the issue?
Which of the following should be done NEXT to continue …
A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and
running anti-malware software, the problem persists and the technician finds that two rogue processes cannot
be killed. Which of the following should be done NEXT to continue troubleshooting the problem?
Which of the following is the MOST likely cause of this…
Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message
that updates are being installed. Which of the following is the MOST likely cause of this issue?
Which of the following is the MOST likely cause of this…
An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving
a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?
Which of the following ports should be allowed?
A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the
Internet. Which of the following ports should be allowed?
Which of the following is the BEST solution for securin…
A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the
user does not want to turn off the computer every time in the evening. Which of the following is the BEST
solution for securing the workstation?
Which of the following is the MOST likely reason the fi…
A user wants to save a file into another user’s directory, but the file save is denied. Which of the following is the
MOST likely reason the file save cannot be completed?
which of the following forms of physical security?
A turnstile is an example of which of the following forms of physical security?
Which of the following Windows features would be used t…
Which of the following Windows features would be used to encrypt a single file or folder?
Which of the following prevention methods is considered…
Which of the following prevention methods is considered to be digital security?