- All Exams Instant Download
Which of the following threats uses personalized information in an attempt at obtaining information?
Which of the following threats uses personalized information in an attempt at obtaining information?A . WhalingB . ImpersonationC . SpoofingD . Spear phishingView AnswerAnswer: D
Which of the following protocols and authentication methods should the technician implement?
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement?...
With which of the following types of infections are the PCs MOST likely infected?
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections...
Which of the following would the project team MOST likely add to the SOW?
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a...
Which of the following is MOST likely causing this error?
A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error?A . The computer has GRUB Legacy installedB...
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?A . Put on an ESD strap.B . Place components on an ESD matC . Disconnect the power before servicing the PCD . Place the PC on a grounded work benchView AnswerAnswer:...
Which of the following steps should the technician take NEXT to resolve the problem?
A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the...
Which of the following should a technician do to resolve the issue and avoid recurrence?
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?A . Activate real-time protection on both antivirus...
Which of the following messages will be displayed?
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized. Which of the following messages will be displayed?A ....
Which of the following steps should be taken FIRST to determine the cause of the issue?
A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?A . Uninstall the camera applicationB...