Q1. On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?
A. Content Advisor
B. Proxy Settings
C. Network Drive Mapping
D. Local Security Policy
Answer: B
Q2. A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?
A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection
Answer: C
Q3. A technician would like to ensure all previous data is erased before reloading Windows 7
Home Premium onto a laptop. Which of the following procedures would accomplish this?
A. Virtual RAID configuration
B. Quick format
C. New partition
D. Full format
Answer: D
Q4. A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue?
A. Unsupported operating system
B. Unacceptable CPU type and speed
C. Insufficient airflow and cooling
D. Inadequate video RAM amount
Answer: C
Q5. An administrator is in a Remote Assistance session, sharing a user’s desktop. While trying to map a shared network drive for the user, an “access denied” error is encountered while using the user’s credentials. Which of the following should be the administrator’s NEXT step?
A. Ensure the user’s account is not locked out
B. Use the fully qualified domain name of the share
C. Open the location with administrator privileges
D. Try mapping with a different drive letter
Answer: C
Q6. An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?
A. Set up shares with permissions based upon group membership.
B. Implement a written policy addressing the issue for all users.
C. Monitor access to the network shares using SNMP.
D. Prevent remote logins to all network shares and drives.
Answer: A
Q7. In order to prevent other users from editing files in ‘C:\ Files’, which of the following steps should be taken?
A. Set NTFS permissions to read only
B. Set the folder to index files for search
C. Set the local administrator as the owner of the folder
D. Set network share permissions to read only
Answer: A
Q8. A technician is setting up automatic login to desktop for a non-domain Windows XP system. Which of the following administrative tools would accomplish this?
A. User Accounts
B. Network and Sharing Center
C. Task Manager
D. System Configuration
Answer: A
Q9. A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?
A. Message of the Day
B. Email lists
C. Company forums
D. Regular user education
Answer: D
Q10. When moving files from a Microsoft gaming console, which of the following command line utilities is recommended to transfer files?
A. IMAP
B. XCOPY
C. DISKPART
D. FDISK
Answer: B
Q11. A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and the technician finds that two rogue processes cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem?
A. Run msconfig to clean boot the computer
B. Run Event Viewer to identify the cause
C. Run System Restore to revert to previous state
D. Run Recovery Console to kill the processes
Answer: A
Q12. Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST?
A. Set the application to run in XP compatibility mode
B. Reinstall Windows XP
C. Configure a dual boot with XP and 7
D. Install the application in XP mode
Answer: A
Q13. A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?
A. Physical destruction
B. Quick format
C. Low level format
D. Overwrite
Answer: A
Q14. Which of the following identifies traffic based upon its physical network address?
A. Phishing
B. Hashing
C. MAC filtering
D. Geotracking
Answer: C
Q15. Which of the following features of a mobile device operates the touch screen?
A. Gyroscope
B. Digitizer
C. Accelerometer
D. Geotracking
Answer: B