1. A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however, when the laptop lid is closed, it goes into sleep mode. Which of the following Control Panel items can be used to disable this feature?
A) A. Action Center
B) B. System
C) C. Display Settings
D) D. Power Options
2. An end-user receives an unsolicited and unencrypted email containing a co-worker's birth date and social security number. The end-user should immediately contact the IT department and report a violation of which of the following policies?
A) A. DRM
B) B. EULA
C) C. IRP
D) D. PII
3. A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?
A) A. Disable System Restore
B) B. Schedule scans and run updates in safe mode
C) C. Quarantine the system
D) D. Create a System Restore point
4. Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe?
A) A. Social engineering
B) B. Spoofing
C) C. Zero-day
D) D. Man-in-the-middle
5. A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. -primary drive 0 not found. Press F1 to continue.' Which of the following should the technician check FIRST?
A) A. That NTLDR and boot.ini are not missing
B) B. Proper drive installation (e.g. cables/jumpers)
C) C. If the computer can boot into safe mode
D) D. If the BIOS boot settings are correct
Write a public review