Which of the following technologies is used by malicious employees to obtain user passwords?
Which of the following technologies is used by malicious employees to obtain user passwords?A . Main-in-the-middleB . PhishingC . TailgatingD . Shoulder surfingView AnswerAnswer: D
Which of the following is MOST likely causing the missing folders issue?
A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?A . The...
Which of the following built-in accounts was removed in Windows 10?
Which of the following built-in accounts was removed in Windows 10?A . Power UserB . AdministratorC . GuestD . Standard UserView AnswerAnswer: A
Which of the following is causing the error?
A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message. Which of the following is causing the error?A . Small hard driveB . Insufficient RAMC . OS compatibilityD . Folder permissionsView AnswerAnswer: C
Which of the following are the MOST likely causes of these issues?
A user calls a technician to report issues when logging in to a vendor’s website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user’s office. The user also informs the technician of strange pop-up...
Which of the following commands should the administrator run on the user’s workstation?
A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user’s workstation?A . chkdskB . netstatC...
Which of the following documents did the network administrator MOST likely give to the technician?
A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?A . Process diagramB . Physical network diagramC . Fiber backbone diagramD . Logical...
Which of the following threats uses personalized information in an attempt at obtaining information?
Which of the following threats uses personalized information in an attempt at obtaining information?A . WhalingB . ImpersonationC . SpoofingD . Spear phishingView AnswerAnswer: D
Which of the following should the technician have covered previously as part of the original repair?
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair?A . End-user educationB . Pre-installation environment cleaningC ....
Which of the following license type should the technician recommend?
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?A . Open licenseB . Personal licenseC . Corporate licenseD . Enterprise licenseView AnswerAnswer: A