1. A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation?
A) A. Set a strong password that requires a renewal every 30 days. B) B. Run a screensaver after one minute of non-use and fingerprint lock for after hours. C) C. Apply a screen lock after five minutes of non-use and login time restrictions for after hours. D) D. Require a password and fingerprint lock after hours.
2. Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?
A) A. NSLOOKUP B) B. NETSTAT C) C. NBTSTAT D) D. NET
3. Which of the following best practices is used to fix a zero-day vulnerability on Linux?
A) A. Scheduled backup B) B. Scheduled disk maintenance C) C. Patch management D) D. Antivirus update
4. A user states that when they logon to their computer sometimes they get an IP conflict error. The user computer is configured with a static IP. Which of the following is the problem?
A) A. Duplicate IP exist on the network B) B. DHCP server needs to be rebooted C) C. Network adapter driver needs to be updated D) D. Bad network adapter
5. A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and the technician finds that two rogue processes cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem?
A) A. Run msconfig to clean boot the computer B) B. Run Event Viewer to identify the cause C) C. Run System Restore to revert to previous state D) D. Run Recovery Console to kill the processes
Leave a comment