1. A user wants to restore an application-s security settings to an iOS device, but an Internet connection is unavailable. Which of the following tools can assist with mitigating this issue?
A) A. Time machine B) B. Apple Configuration C) C. Device stage D) D. iCloud
2. Which of the following statements is true regarding the differences between a 32-bit and 64-bit OS?
A) A. A 32-bit version of the OS will not run on 64-bit hardware, but a 64-bit OS will run on 32-bit hardware. B) B. A 32-bit version of the OS requires twice the number of CPU clock cycles to write the same amount of data as a 64-bit OS. C) C. A 64-bit version of the OS will address memory in eight octets. D) D. A 64-bit version of the OS will write data to disk in block sizes of eight octets
3. Which of the following combinations provides the STRONGEST authentication security?
A) A. Hardware token B) B. Username and password C) C. Smart card with PIN D) D. Voice then fingerprint recognition
4. A Windows PC suffered a bad update, so a systems administrator removed the update. Which of the following tools should the systems administrator run to ensure the Windows files are not corrupted?
A) A. MSConfig B) B. Sfc C) C. Defrag D) D. Chkdsk
5. A home user receives a call from a technician who claims to be with a virus control company. The technician explains that the user-s PC is infected with harmful viruses. The technician instructs the user how to get to the Event Viewer where all errors can be seen. The technician claims this problem can be fixed for money.Which of the following threats has the user been a victim of?
A) A. Phishing B) B. Social engineering C) C. Man-in-the-middle D) D. Spoofing
Leave a comment