Professional Documents
Culture Documents
CET-Reviewer-Chapter1-28
CET-Reviewer-Chapter1-28
CET-Reviewer-Chapter1-28
B. Certified Cisco Network Professional 7. How many questions should you expect
on the 220-901 exam?
C. CompTIA Security+
A. 25
D. Microsoft Certified Solutions Expert
B. 50
3. Which of the following exams focuses
on installing, configuring, and maintaining all C. 90
the standard hardware technology involved D. The number of questions varies
in a personal computer? because the exams are adaptive.
A. Certified Cisco Network Associate 8. The CompTIA A+ certification covers
B. CompTIA A+ 220-901 which of the following operating systems?
(Select three.)
C. CompTIA A+ 220-902
A. Linux
D. Microsoft Certified Solutions Expert
B. Mac OS X
4. At which of the following Web sites can
you register to take the CompTIA A+ C. Windows XP Media Center
certification exams? D. Windows 7
A. www.comptia.org 9. What percentage of questions should
B. www.microsoft.com you expect on Windows operating systems
in the 220-902 exam?
C. www.totalsem.com
A. 12%
D. www.vue.com
B. 22%
C. 24%
D. 29%
10. What percentage of questions should D. Never
you expect on networking in the 220-901
1. You become CompTIA A+ certified by
exam?
passing the CompTIA A+ 220-901 and
A. 34% CompTIA A+ 220-902 exams.
B. 17% 2. A(n)
____Certification______________ gives
C. 28%
clients and employers a level of confidence
D. 21% that you can do what you say you can do.
11. How much does it cost to take each 3. A term for a person who builds and
exam (at the time of this book’s maintains computers is __PC
publication)? Tech________________.
8. A customer complains that he can hear 3. Al in marketing calls in for tech support,
music coming from his computer speakers, complaining that he has a dead PC. What is
even though the computer is not playing any a good first question or set of questions to
music. This is most likely caused by begin troubleshooting the problem?
___Radio Frequency Interference
A. Did the computer ever work?
(RFI)_______________.
B. When did the computer last work?
9. Once you have determined the problem
with the machine and come up with C. When you say “dead,” what do you
probable causes, you should __test the mean? What happens when you press
theory________________. the power button?
10. Once you have successfully repaired D. What did you do?
the machine, it is important to
__verify________________ with the user
that everything is working correctly.
4. While manning the help desk, you get a 6. While fixing a printing problem on Paul’s
call from Bryce in sales complaining that he computer, you check his e-mail out of
can’t print and every time he clicks on the curiosity to see if there are any interesting
shared network drive, his computer stops messages there. You find several personal
and freezes. He says he thinks it’s his hard e-mails he has sent. Using the company
driver. What would be a good follow-up computer for personal e-mail is against
question or statement? regulations, so what should you do?
A. Bryce, you’re an idiot. Don’t touch A. Leave the e-mail on the computer and
anything. I’ll be there in five minutes. notify your boss.
B. Okay, let’s take this one step at a B. Delete the e-mails from the computer
time. You seem to have two problems, and notify your boss.
one with printing and the second with
the shared network drive, right? C. Delete the e-mails from the computer
and remind Paul of the workplace
C. First, it’s not a hard driver; it’s a hard regulations.
drive. It doesn’t have anything to do with the
D. You shouldn’t be looking in his e-
shared network drive or printing, so that’s
mail folders at all as it compromises
just not right.
your integrity.
D. When could you last print?
7. You are solving a problem on Kate’s
5. When troubleshooting a software computer that requires you to reboot several
problem on Phoebe’s computer and times. Upon each reboot, the logon screen
listening to her describe the problem, you appears and prompts you for a username
get a text message on your phone. It’s your and password before you can continue
boss. What would be an acceptable action working. Kate has gone to another office to
for you to take? continue her work on another computer.
How do you proceed?
A. Excuse yourself, walk out of the cube,
and text your boss. A. Call Kate, ask her for her password,
type it in, and continue working on the
B. Pick up Phoebe’s phone and dial your
problem.
boss’s number.
B. Insist that Kate stay with you and have
C. Wait until Phoebe finishes her
her type the password each time it is
description and then ask to use her phone
needed.
to call your boss.
C. Call Kate and have her come in to type
D. Wait until Phoebe finishes her
the password each time it is needed.
description, run through any simple
fixes, and then explain that you need to D. Have Kate temporarily change her
call your boss on your cell phone. password for you to use as you work;
then have her change it back when you
are through.
8. You are working in a customer’s home 12. Which of the following tools would you
and his five-year-old child continues to find in a typical PC tech’s toolkit? (Select
scream and kick the back of your chair. two.)
What do you do?
A. Phillips-head screwdriver
A. Ignore the child and finish your work as
B. Torx wrench
quickly as you can.
C. Hammer
B. Discipline the child as you see fit.
D. File
C. Politely ask your client to remove the
child from your work area. 13. What term describes the flow of a
static electrical charge from a person to the
D. Tell your client you refuse to work under
inside of the PC?
such conditions and leave the premises with
the job half done. A. EMI
9. After replacing a keyboard a user has B. ESD
spilled coffee on for the fifth time, what
should you say to the user? C. HDMI
D. C:\Users\Mike\Desktop\Downloads A. Settings
B. Control
C. Command Center
D. Control Center processor to protect certain sections of
memory.
5. Areas inside the CPU where it B. The external data bus enables the CPU
temporarily stores internal commands and to communicate with the MCC.
data while it is processing them are called C. The address bus enables the CPU to
_____registers_____________. communicate with the hard drive.
6. Divided into L1, L2, and L3, the D. The system bus enables the CPU to
______cache, ____________ consists of a communicate with the memory.
small amount of static RAM (SRAM) that
serves as a holding area. This provides data 3. What do 64-bit processors expand
to the CPU beyond what 32-bit processors have?
C. Lift the ZIF socket arm; place the CPU D. NMIs only happen on Windows
according to the orientation markings; snap systems.
on the heat-sink and fan assembly; plug in 2. Silas has an AMD-based motherboard
the fan. with two sticks of DDR2 RAM installed in
D. Take all of the steps you want to take two of the three RAM slots, for a total of 2
because it’s not going to work. GB of system memory. When he runs CPU-
Z to test the system, he notices that the
14. A client calls to complain that his software claims he’s running single-channel
computer starts up, but crashes when memory. What could be the problem?
Windows starts to load. After a brief set of (Select the best answer.)
questions, you find out that his nephew
upgraded his RAM for him over the A. His motherboard only supports single-
weekend and couldn’t get the computer to channel memory.
work right afterward. What could be the B. His motherboard only supports dual-
problem? channel memory with DDR RAM, not DDR2.
A. Thermal paste degradation C. He needs to install a third RAM stick to
B. Disconnected CPU fan enable dual-channel memory.
3. When you turn on your computer, what C. CMOS includes the power-on self test
is accessed first? (POST) routines.
8. What sort of power connector does a B. The red lead should always touch the
traditional hard drive typically use? black ground wire; the black lead should
always touch the red hot wire.
A. Molex
C. The red lead should always touch the
B. Mini yellow hot wire; the black lead should touch
C. Sub-mini the red hot wire.
C. Always keep the power supply plugged 10. A spare part that a tech typically
in to the wall outlet when working on the carries to replace a failed component in the
inside of a computer, as this helps to ground field is called a(n) ___field replaceable
it. unit (FRU)_______________.
D. Windows does not support RAID 0+1. 7. Self-Monitoring, Analysis, and Reporting
Technology (S.M.A.R.T) is an internal drive
program that tracks errors and error 4. You receive an “Invalid media” error
conditions within a drive. when trying to access a hard drive. What is
the most likely cause of the error?
8. The Non-Volatile Memory Express
(NVMe) specification supports a A. The drive has not been partitioned.
communication connection between the
B. The drive has not been set to active.
operating system and the SSD directly
through a PCIe bus lane, reducing latency C. The drive has not been formatted.
and taking full advantage of the wicked-fast
speeds of high-end SSDs. D. The drive has died.
9. Seen in RAID 5, disk striping with parity 5. What does NTFS use to provide security
uses at least three drives and combines the for individual files and folders?
best features of disk mirroring and disk A. Dynamic disks
striping.
B. ECC
10. RAID 10 features both nesting and
striping and requires at least four drives. C. Access Control List
D. MFT
6. What graphical program does Microsoft
include with Windows to partition and format
a drive?
1. What is the default file system in A. Format
Windows?
B. Disk Management console
A. exFAT
C. Disk Administrator console
B. ext4
D. System Commander
C. HFS+
7. Which of the following statements apply
D. NTFS to MBR drives? (Select two.)
2. What is the default file system in Mac A. Maximum partition size of 2.2 TB
OS X?
B. Unlimited number of partitions
A. exFAT
C. Cannot span partitions across multiple
B. ext4 drives
C. HFS+ D. Can stripe partitions across multiple
D. NTFS drives
3. What is the default file system in most 8. How can you effectively expand the
current Linux distros? capacity of an NTFS drive?
9. A series of instructions telling a computer C. Open the Devices and Printers applet in
how to read a compressed file is called a(n) the Control Panel, right-click on the printer,
Codec select Printer properties, and then check the
Share this printer checkbox on the Sharing
10. While a CD-ROM disc holds about 650 tab.
MB of data, a(n) Digital Versatile Disk stores
from 4.37 GB to 15.9 GB, depending on the D. You have to have Windows Home
number of sides and layers used. Server in order to share printers.
8. Which of the following are Microsoft A. Reboot and start the installation
compatibility tools that enable you to scan process. Pay attention to the text in the
your current hardware to see if it can handle lower third of the screen and write down the
upgrading to a new version of Windows? error message revealed.
(Select two.)
B. Push the Reset button to restart the
A. Windows Upgrade Advisor installation process. Pay attention to the text
in the lower third of the screen and write
B. Hardware Compatibility Upgrader down the error message revealed.
(HCU)
C. Reboot and start the installation
C. Upgrade Assistant process. After it starts, press the ESC key to
D. Hardware State Migration Tool (HSMT) cancel the installation process and show the
previous installation notes.
9. What is the most common boot method
for installing Windows 8? D. Review the setuperr.log files to track
any errors discovered.
A. Boot to a Windows DVD
13. Which term describes a combination of
B. Boot to a Windows CD-ROM many updates and fixes in Windows
Vista/7?
C. Boot to a PXE drive
A. Hot fix
D. Boot to a recovery partition
B. Hot pack
10. When you install an operating system
alongside an existing operating system, C. Service pack
what do you create?
D. Service release
A. A clean installation
14. Your boss has tasked you to load
B. An upgrade installation identical images onto a series of Mac OS X
workstations to get the classroom ready for
C. A multiboot installation
the new group of students. In such a
D. A network installation scenario, what’s the best tool to use?
1. A(n) thin client is a system designed to 2. Which of the following root keys
handle only very basic applications with an contains the data for a system’s non-user-
absolute minimum amount of hardware specific configurations?
required by the operating system. A. HKEY_LOCAL_MACHINE
2. A(n) audio interface is a box that you B. HKEY_USERS
hook up to your PC with inputs that enable
you to connect professional microphones C. HKEY_CURRENT_USER
and instruments.
D. HKEY_CLASSES_ROOT
3. (HTPC) Home Theater PC cases are
3. Tim needs to register an important DLL
used to make your computer blend in with
file as a command component in the
the rest of your home theater equipment.
Registry. What command-line tool should he
4. If you want to share files and printers use?
over your home network, you can set up
A. regedt64
a(n) Home Server PC
B. regedt32
5. If you have a new hard drive with
nothing on it, you will likely choose to do C. regsvr32
a(n) clean installation
D. regmgr64
6. A(n) patch is a fix for a single problem
with the OS, while a(n) service pack is a 4. What is the name of the command-line
combination of fixes. command for killing tasks?
7. Windows 8.1 uses Boot mgr to boot the D. Local Users and Groups
OS. 5. Which of the following is the strongest
8. The Registry tracks everything about password?
your computer, from file types to user A. 5551212
preferences.
B. Spot01
9. You can open the Task manager directly
by pressing CTRL-SHIFT-ESC. C. 43*xv
B. Open System Preferences and select 8. What tool is used in Ubuntu Linux to
Software Updater from the options. perform full system backups?
4. What tool enables you to correct a 9. Diane complains that her system seems
corrupted Windows operating system by sluggish and she keeps running out of hard
reverting your computer to a previous state? drive space. What Microsoft Windows–
based tool can she use to get rid of
A. Windows Restore unnecessary files and compress older files?
B. Restore State Manager Select the best answer.
A. CAT 1
7. What is a remote computer providing
B. CAT 5 resources called?
D. CAT 6 B. DNS
C. Server
A. RJ-11
8. What is the total amount of data that a
B. RJ-45 network can handle called?
C. Plenum A. Protocol
D. PVC B. Broadcast
C. Bandwidth
A. Cheaper.
9. What do you call the discrete “chunks” of
B. Easier to install. data that networks transmit?
C. LANs
D. U
D. Tone generator
4. A computer on a(n) IPV4 network gets a
32-bit address.
5. A computer on a(n) IPV6 network gets a 2. Simon’s system can’t contact a DHCP
128-bit address. server to obtain an IP address automatically,
but he can still communicate with other
systems on his subnet. What feature of
6. A(n) Router is a device that has at least Windows makes this possible?
two IP addresses: one that connects to your
A. Subnet masking
LAN’s switch and one that connects to the
“next network.” B. Default gateway
C. APIPA
D. dhcp /review
6. You are down under your desk organizing 10. Which of the following is a legitimate
some wires when you notice that the activity IPv6 address?
light on your NIC is blinking erratically. Is
A. 192.168.1.25
there a problem?
B. FEDC::CF:0:BA98:1234
A. Yes, the activity light should be on
steadily when the computer is running. C. FEDC::CF:0BA98:1234
D. FEDC::CF:0:BA98:12345
B. Yes, the activity light should be blinking
steadily, not randomly.
11 You are trying to locate which patch
C. No, the light blinks when there is cable in the main switch traces back to a
network traffic. particular computer. Which tool should you
use?
D. No, the light blinks to show bus activity.
A. Tone probe
B. Cable tester
7. What is a common symptom of a bad
network cable? C. Punchdown tool
A. Rapidly blinking link lights D. Butt set
B. No link lights
D. net view
13. Which tool in Linux enables you to
determine exactly what information the DNS
server is giving you about a specific host
9. What Windows-based command would
name?
you use to view the path taken by a TCP/IP
packet? A. ipconfig
A. ping B. ifconfig
B. traceroute C. nslookup
C. tracert D. ping
D. nslookup
14. What benefit does full-duplex offer? 4. Computers are in Ad hoc mode when
they connect directly together without using
A. It enables NICs to send and receive
a WAP.
signals at the same time.
15. What do most techs call a toner or tone 7. The wireless Ethernet standard that runs
generator? at speeds up to 54 Mbps but has limited
range because it uses the 5-GHz frequency
A. TDR
is 802.11a.
B. UTP
C. UDP
8. If you need to share an Internet
D. Fox and Hound connection or connect to a wired network
through your wireless network, you would
use Infrastructure Mode.
C. Infrastructure
A. 802.11ac
2. What device centrally connects wireless
network nodes in the same way that a hub or B. 802.11b
switch connects wired Ethernet PCs?
C. 802.11g
A. Bluetooth adapter
D. 802.11n
B. Wireless NIC
C. SSID
7. Personal area networks are created by
D. WAP what wireless technology?
D. ~500 ft
8. What is the best technology if you need
Internet access from anywhere in the
country?
4. Which encryption method used on
wireless networks is the most secure? A. Bluetooth
A. WEP B. IrDA
B. Wi-Fi C. Wi-Fi
D. WPA2
A. Encryption B. IrDA
D. PoE
2. The time it takes for a packet to travel to
its destination and back is called latency.
13. Which of the following uses
beamforming antenna technology to
optimize 802.11ac wireless connections? 3. Internet Explorer is a(n) web browser.
A. CSMA/CD
9. A(n) Virtual Private Network enables 4. What port does POP3 use?
you to access a remote network over the A. 22
Internet securely.
B. 110
C. 548
10. Using UDP port 161, Simple Network
Management Protocol (SNMP) enables D. 3389
remote management of network devices.
B. BRI C. Backbones
D. CDMA
9. John tried going to www.totalsem.com
with his Web browser, but the Web site
wouldn’t load. He opened a command-line 12. Mandy wants to connect to another
window and typed ping www.totalsem.com. computer using a safe-from-hackers
He received a message that the ping request command-line utility Which should she use?
couldn’t find www.totalsem.com. What is the
A. FTP
most likely reason John received this
message? B. PPP
A. Bad default gateway C. SSH
B. DNS failure D. Telnet
C. Corrupted NIC driver
D. Too many applications using the Internet 13. Which port number(s) is/are used with
connection simultaneously IMAP4?
A. 25
B. 110
C. 143
D. 23, 24
14. A new client lives in a rural area, outside 5. The GPS enables a mobile device to
the connectivity radius of the local cable determine where you are on a map.
company and definitely more than 20,000
feet away from the nearest switching center 6. When you want to buy software for an
for the phone company. Which Internet Android device, you buy from Google Play.
option offers the client the best performance?
7. A wearable device that counts your
A. Cable steps or measures your heart rate is called
a(n) Fitness Monitor.
B. Dial-up
15. Percy’s office features five users and a 9. App developers use a mobile operating
single cable Internet connection. What system’s SDK(software development kit)
feature should be enabled on the router to to build apps for devices running the OS.
ensure certain users, applications, or
10. Swiping your finger across the screen
services are prioritized when there isn’t
on a mobile device to switch the screen to
enough bandwidth to go around by limiting
the next item, such as the next page in an
the bandwidth for certain types of data? e-book, is one example of the role
A. DUN Gestures play in the user interface.
B. NAT
1. Which operating system powers an Apple
C. QoS
mobile device?
D. VoIP
A. Android
B. iOS
Chapter 24
C. macOS
1. All mobile operating systems have a(n)
GUI that enables users to interact with the
D. Windows Mobile
device.
2. Which feature of some mobile devices
2. Many Apple mobile devices use the
allows you to place phone calls over an
proprietary Lightning cable for recharging
802.11 network?
and connectivity.
A. Roaming
3. The feature that enables a user to rotate
a tablet and have the screen rotate with the
B. Airplane mode
device is called a(n) accelerometer.
C. Mobile hotspot
4. A(n) E-Reader is a standalone device
designed to be easier to use for the purpose
D. Wi-Fi calling
of reading.
3. John has a high-resolution image on his discover and select the Bluetooth device
iPad of his 2-year-old son and the family for pairing; enter a PIN code or other
dog. The image initially displays smaller pairing sequence.
than the screen, so he wants to zoom in to
get the details of his son’s expression. What B. Turn on the Bluetooth device; find the
gesture can he use to accomplish this task? device with the tablet; enter a PIN code or
other pairing sequence.
A. Click the mouse in the middle of the
picture to select it, then use the scroll wheel C. Search for a Bluetooth device from the
on the mouse to zoom in. tablet; select pair from the options to enable
the device.
B. Tap the picture with his index finger on
his son’s face. D. Enable Bluetooth on the tablet; turn on
the Bluetooth device; find the device with
C. Long-press on the image and select the tablet; select pair from the options to
zoom from the pop-up menu. enable the device.
D. Touch his son’s face on the screen 7. Which of the following is a 15-digit
with his thumb and finger, then pinch number used to uniquely identify a mobile
outward to scroll in. device that connects to a cellular network?
A. CCFL B. GSM
B. LCD C. ICCID
C. LED D. IMSI
B. 802.11 A. Scratches
C. Bluetooth B. Impact
4. Knowledge, possession, and inherence D. Close all open applications and attempt
are the primary elements of multifactor to reopen the application to see if it freezes
authentication. again.
5. A(n) Bring Your Own Device (BYOD) 2. What is the difference between a hard
policy enables individual employees to use reset, a factory reset, and a reset to factory
personal mobile devices at work. default?
4. Your cousin Eric called to tell you he’d B. Incorrectly installed protective cover
be in the Macy’s Thanksgiving Day Parade
and asked you to text when his float was on C. A swollen battery
TV. You did, but he didn’t get the message
until hours later. You ask if his signal was D. Frame damage caused by dropping the
okay, thinking the tall buildings might have device
interfered, but he insists his phone had
three or more bars every time he checked. 7. What is a good reason to avoid saving
What might have happened? user names and passwords for services like
corporate e-mail or VPN?
A. All of the texts he was receiving from
friends and family exceeded his carrier’s A. Users who save their credentials are
texts-per-hour rate and the extra messages more likely to forget them, wasting your time
were queued for later delivery. with avoidable password resets.
B. Electromagnetic interference from the B. Because user name and password are
generators animating nearby floats kept his both the same authentication factor
phone from receiving messages. (knowledge), it isn’t safe to store them
together.
C. The wire framing in parade floats is
notorious for interfering with cellular C. Devices with saved credentials may
reception. attempt to sign in repeatedly if the service is
unreachable, overloading the network.
D. The huge crowd may have
overloaded the nearby cell towers. D. If the device is lost or stolen,
whoever holds it can use the device to
5. What is the first step to managing access and abuse these services.
battery life well?
8. A client calls and is upset that he’s
A. Turn down the display brightness misplaced his iPad. The mobile device has
setting. literally thousands of client records,
including business addresses, e-mail
B. Keep the device in airplane mode while addresses, phone numbers, and, in some
you sleep. cases, credit card information. What is the
first thing he should do?
C. Use a dark theme in any apps that
support one. A. There’s nothing he can do.
D. Make sure the device’s battery life B. He should call his ISP and have them
exceeds the user’s needs to start with. track his iPad.
C. He should access his iCloud account C. Analyze the permissions used by
and reset his iPad to erase all personal installed applications to highlight
data. security risks
D. He should purchase another iPad and D. Analyze Wi-Fi signals to identify evil-
sync with his iTunes account. This twin WAPs
automatically erases the information on the
old tablet. 12. What can cause a device to be unable
to decrypt e-mail? (Select two.)
9. Which of the following authentication
schemes uses three factors? A. The e-mail application doesn’t
support the encryption method used or
A. A door lock requiring a PIN code, an ID is misconfigured.
badge, and a key
B. The device doesn’t have the other
B. A Web application login process user’s key to decrypt the e-mail with.
requiring your user name, password, Social
Security number, and date of birth C. The device is over its data transmission
limit. While it can still download e-mail, you
C. A door lock requiring a fingerprint scan, can’t decrypt it; you’ll need to increase the
a speech sample, and an ID badge plan size or wait for the next billing period.
D. A door lock requiring a fingerprint D. You can only send and receive
scan, a PIN code, and an ID badge encrypted e-mail if the entire device has
been encrypted first.
10. What is the first step toward preventing
unintended wireless connections? 13. If used regularly, which of the following
gives you the best chance of realizing a
A. Configure devices not to Stingray or similar device has been
automatically connect. deployed near your company’s
headquarters?
B. Get a protective cover that blocks the
USB ports. A. Geofencing
11. What do app scanners do? 14. Which of the following is not a risk
when you root or jailbreak a mobile device?
A. Scan QR codes and barcodes for
hidden codes A. Voiding the manufacturer warranty
B. Analyze the traffic into and out of an B. Being denied access to a corporate
application for suspicious behavior network
CHAPTER 26 C. Laser
1.A printer that creates an image on paper
by physically striking an ink ribbon against D. Primary corona
the paper’s surface is known as a(n) Impact
printer. 2. Janet just bought a new computer. She
wants to install her three-year-old inkjet
2. Laser printers use lasers to create the printer on the new system but has lost the
print image on a(n) Imaging drum, which is driver disc. She can’t get on the Internet to
also known as a(n) photosensitive drum. download the latest drivers. What should
she do for drivers?
3. The Fuser assembly on a standard
laser printer contains a pressure roller and a A. Install a driver for a similar printer.
heated roller.
B. She’s stuck until she can get on the
4. Adobe Systems’ Postscript is a device- Internet.
independent printer language capable of
high-resolution graphics and scalable fonts. C. She can use the Mac drivers.
5. Windows uses the graphical device D. She can install the printer without
interface GDI component of the operating drivers.
system to handle print functions.
3. John just installed a second printer on
6. The resolution of a printer is measured his system. When he prints in Microsoft
in dots per inch (dpi) . Word, the job goes to the wrong printer.
What does he need to do to get print jobs
7. A printer’s speed is rated in pages per always to go to one printer or the other?
minute (ppm) .
A. He needs to set the primary printer.
A. He turned off the yellow nozzle. 8. The output from Diane’s laser printer is
fading evenly. What should she suspect
B. He has run out of yellow ink. first?
C. Laser CHAPTER 27
1.Mary’s company routinely labels data
D. Thermal wax transfer according to its sensitivity or potential
danger to the company if someone outside
13. Your multifunction device fails to print accesses the data. This is an example of
your print jobs and instead displays a MEM data classification.
OVERFLOW error. What can you do to
rectify the problem? (Select two.) 2. A(n) Trojan masquerades as a
legitimate program, yet does something
A. Install more RAM in the printer. different than what is expected when
executed.
B. Install more RAM in the computer.
3. Antivirus software uses updatable
C. Upgrade the RIP. definition files to identify a virus by its
signature.
D. Disable RET.
4. Enable object access auditing to
create Event Viewer entries when a specific
file is accessed.
C. DMZ
1. What is the process of using or
manipulating people to gain access to D. Multifactor authentication
network resources?
5. Zander downloaded a game off the
A. Cracking Internet and installed it, but as soon as he
started to play he got a Blue Screen of
B. Hacking Death. Upon rebooting, he discovered that
his Documents folder had been erased.
C. Network engineering What happened?
D. They can reduce the amount of spam C. Boot to a safe environment and run
by 97 percent. antivirus software.
10. Which threats are categorized as A. Applaud the technician for proper
social engineering? (Select all that apply.) compliance.
C. HTTPS
D. Kerberos 13. A user calls and complains that the
technician who fixed his computer removed
some software he used to download movies
10. Which threats are categorized as social and music on the Internet. A check of
engineering? (Select all that apply.) approved software does not include the
uTorrent application. What should you do?
A. Telephone scams
A. Applaud the technician for proper
compliance.
B. Phishing B. Educate the user about the legal issues
involved with movie and music downloads.
C. Trojan horses
C. Add the uTorrent application to the
D. Spyware
approved software list and make the
technician apologize and reinstall the
software.
11. A user calls to complain that his
computer seems awfully sluggish. All he’s
done so far is open his e-mail. What should
D. Check with the user’s supervisor about
the tech do first?
adding uTorrent to the approved software
A. Educate the user about the dangers of list.
opening e-mail.
B. Quarantine the computer so the
14. Mike hands the hard drive containing
suspected malware does not spread.
suspicious content to the head of IT security
C. Run anti-malware software on at Bayland Widgets Co. The security guy
thecomputer. requests a record of everyone who has been
in possession of the hard drive. Given such a
D. Remediate the infected system. scenario, what document should Mike give
the IT security chief?
A. Chain of custody
B. Definition file
C. Entry control roster
D. Trusted root CA