1. An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?
A) A. Phishing B) B. Spear phishing C) C. Dumpster diving D) D. Impersonation
2. A network administrator has given technician documentation detailing the switch ports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?
A) A. Process diagram B) B. Physical network diagram C) C. Fiber backbone diagram D) D. Logical topology diagram
3. A technician needs to perform a backup while a system is running. Which of the following services allows this task to be accomplished?
A) A. Robocopy B) B. Shadow copy C) C. Xcopy D) D. System restore
4. Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open?
A) A. Backup B) B. Recovery Image C) C. chkdsk D) D. System Restore
5. A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network?
Leave a comment