1. A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the following commands should be run on the workstation?
A) A. extract
B) B. tasklist
C) C. gpupdate
D) D. gpresult
E) E. chkdsk
2. An end-user receives an unsolicited and unencrypted email containing a co-worker-s birth date and social security number. The end-user should immediately contact the IT department and report a violation of which of the following policies?
A) A. DRM
B) B. EULA
C) C. IRP
D) D. PII
3. A user tries to login and receives the error message -The User Profile Service failed to login. User Profile cannot be leaded. Which of the following should be the FIRST method to troubleshoot the issue?
A) A. Use Automated System Recovery
B) B. Boot PC into Safe Mode
C) C. Use System File Checker
D) D. Perform hardware diagnostics
4. A computer was recently infected by malware after a flash drive was plugged in. The user, Ann, indicates she never opened any files or folders from the flash drive. A technician needs to prevent this from occurring in the future. Which of the following would accomplish this?
A) A. BitLocker To Go
B) B. Set strong passwords
C) C. Disable user in
D) D. Disable AutoRun
5. A technician wants to secure a company-s laptops by preventing the USB flash drive from being used. Which of the following would be the BEST and FASTEST way for the technician to accomplish this goal?
A) A. Use intrusion prevention systems
B) B. Disable physical ports
C) C. Uninstall USB drivers
D) D. Install HIDS
Write a public review