For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?


A.      Annual cyber security education.

B.      Update antivirus signatures more often.

C.      Block all email attachments.

D.      Install an IPS on each workstation.


Correct Answer: A




A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?


A.      Message of the Day

B.      Email lists

C.      Company forums

D.      Regular user education


Correct Answer: D




Which of the following operating systems can be upgraded directly to Windows 7 Professional by a default installation? (Select TWO).


A.      Windows 7 Home Premium

B.      Windows Vista Business

C.      Windows XP Home

D.      Windows XP Professional 64-bit

E.       Windows XP Media Center


Correct Answer: AB




A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT?


A.      Document findings, actions, and outcomes.

B.      Escalate problem to a senior technician.

C.      Re-establish new theory of probable cause.

D.      Perform a full system backup.


Correct Answer: A




A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?


A.      Turning down the radio power level

B.      Enabling MAC filtering

C.      Setting a high encryption level

D.      Disabling the SSID broadcast


Correct Answer: B




A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone’s knowledge. Which of the following would prevent this from occurring?


A.      Change to user MAC filtering

B.      Change default usernames and passwords

C.      Disable the SSID from broadcasting

D.      Enable static IP addresses


Correct Answer: B




A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?


A.      Configure the server to use a static IP

B.      Logically move the server to the DMZ

C.      Reallocate the server to a different networking closet

D.      Disable the remote desktop port


Correct Answer: D


Which of the following is an example of client-side virtualization?


A.      Compatibility mode on a program icon properties menu.

B.      Running a DOS application on a Windows 7 32-bit operating system.

C.      Cloud hosted office applications.

D.      XP mode running in Windows 7 64-bit operating system.


Correct Answer: D




Laptops and tablets have which of the following in common?


A.      Solid state drives

B.      Contain an accelerometer

C.      No field serviceable parts

D.      Not upgradable


Correct Answer: A




Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?





D.      NET


Correct Answer: D



Comments are closed.