1. A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?
A) A. Air filters B) B. Privacy screens C) C. Vacuums D) D. ESD mats
2. A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?
A) A. Use an antivirus product capable of performing heuristic analysis B) B. Use a host-based intrusion detection system on each computer C) C. Disallow the password caching of accounts in the administrators group D) D. Install a UTM in between PC endpoints to monitor for suspicious traffic E) E. Log all failed login attempts to the PCs and report them to a central server
3. Which of the following techniques is used by malicious employees to obtain user passwords?
A) A. Main-in-the-middle B) B. Phishing C) C. Tailgating D) D. Shoulder surfing
4. A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?
A) A. Standard formatting B) B. HD drilling C) C. Low-level formatting D) D. HD partitioning
5. A user reports that when opening a web browser, the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups. Which of the following should a technician do to resolve these issues? (Choose two.)(Select 2answers)
A) A. Reset the user-s browser to default settings B) B. Delete the user-s cached images, temporary files, and cookies C) C. Reboot the user-s computer and install a secondary antivirus D) D. Convince the user to use a different web browser that is currently unaffected E) E. Download the update to the user-s web browser of choice F) F. Remove any unapproved applications from the user-s startup items
Leave a comment