Which of the following are examples of digital security? (Select TWO).


A.      Strong password

B.      Privacy screen

C.      Badge

D.      MAC filtering

E.       Mantrap


Correct Answer: AD




An unknown device has been found on a SOHO wireless router. Which of the following is BEST to perform to keep this device off the network?


A.      Enable MAC filtering

B.      Change the channel

C.      Disable DHCP

D.      Disable SSID broadcast


Correct Answer: A




A technician needs to securely delete all data from a hard drive containing highly sensitive

information. Which of the following is the BEST way to delete the data?


A.      Low-level format.

B.      Manually select and delete the data within the OS.

C.      Delete the partition and re-format.

D.      Standard format.


Correct Answer: A




A user reports that their printouts contain a shadow of the previous image. Which of the

following is MOST likely the cause?


A.      Separation pads

B.      Fuser assembly

C.      Corona wire

D.      Pickup assembly


Correct Answer: B




A user is reporting that their computer is running slow and is having trouble connecting to the

Internet. After further inspection, the technician notices that the antivirus definitions are

up-to-date and the system is scheduled for regular scans. Which of the following solutions will

MOST likely help resolve the issues reported?


A.      Enabling system restore

B.      Anti-spyware software

C.      Spam blocker

D.      Pop-up blocker


Correct Answer: B




Which of the following operating systems can be upgraded using an in-place procedure to

Windows 7 Professional x64?


A.      Windows Vista Professional x86

B.      Windows 7 Enterprise x64

C.      Windows 7 Starter x86

D.      Windows 7 Home Premium x64


Correct Answer: D




Social engineering makes use primarily of which of the following techniques, to bypass common

corporate security barriers?


A.      Grayware installation

B.      Worm transmission

C.      Human interaction

D.      Malware installation


Correct Answer: C




A technician is having issues with a corporate wireless signal bleeding into nearby offices. Which

of the following techniques could be used to mitigate the risk of wireless attacks by third parties

in the nearby offices?


A.      Switch from 802.11b to 802.11g spectrums.

B.      Disable WEP-128 security.

C.      Radio power adjustment.

D.      Switch from 802.11g to 802.11n spectrums.


Correct Answer: C





A user needs to replicate a large directory containing folders and files from one drive to another.

It also contains several empty folders needed for future growth. Which of the following

commands should a technician use in order to accomplish this task?


A.      ATTRIB /S

B.      RD /S

C.      COPY /A

D.      XCOPY /E


Correct Answer: D




Which of the following devices would provide the GREATEST security to a server room?


A.      Keycode pad

B.      Retinal scanner

C.      Badge reader

D.      Mantrap


Correct Answer: B



Comments are closed.