Which of the following types of social engineering threats is this?
An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?A . PhishingB . Spear phishingC . Dumpster divingD . ImpersonationView AnswerAnswer: C
Which of the following is the FIRST option to check?
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?A...
Which of the following is a tool the technician can use to resolve the issue?
A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same...
Which of the following should the installation technician perform to increase the security of the wireless network?
A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.) A. Reduce the transmit power B. Reduce the channel availably C. Disable the...
Which of the following would BEST accomplish this goal?
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish...
Which of the following configuration settings should the technician change to satisfy the requirements of the business?
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)A...
Which of the following is the MOST likely issue Ann is experiencing?
Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is...
Which of the following threats uses personalized information in an attempt at obtaining information?
Which of the following threats uses personalized information in an attempt at obtaining information?A . WhalingB . ImpersonationC . SpoofingD . Spear phishingView AnswerAnswer: D
Which of the following recommendations should the contractor give to the customer?
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which...
Which of the following user types BEST describes this user?
A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user?A . GuestB . Power UserC . AdministratorD . Standard UserView AnswerAnswer: A