Ensurepass

QUESTION 461

Which of the following are examples of digital security? (Select TWO).

 

A.      Strong password

B.      Privacy screen

C.      Badge

D.      MAC filtering

E.       Mantrap

 

Correct Answer: AD

 

 

QUESTION 462

An unknown device has been found on a SOHO wireless router. Which of the following is BEST to perform to keep this device off the network?

 

A.      Enable MAC filtering

B.      Change the channel

C.      Disable DHCP

D.      Disable SSID broadcast

 

Correct Answer: A

 

 

QUESTION 463

A technician needs to securely delete all data from a hard drive containing highly sensitive

information. Which of the following is the BEST way to delete the data?

 

A.      Low-level format.

B.      Manually select and delete the data within the OS.

C.      Delete the partition and re-format.

D.      Standard format.

 

Correct Answer: A

 

 

QUESTION 464

A user reports that their printouts contain a shadow of the previous image. Which of the

following is MOST likely the cause?

 

A.      Separation pads

B.      Fuser assembly

C.      Corona wire

D.      Pickup assembly

 

Correct Answer: B

 

 

QUESTION 465

A user is reporting that their computer is running slow and is having trouble connecting to the

Internet. After further inspection, the technician notices that the antivirus definitions are

up-to-date and the system is scheduled for regular scans. Which of the following solutions will

MOST likely help resolve the issues reported?

 

A.      Enabling system restore

B.      Anti-spyware software

C.      Spam blocker

D.      Pop-up blocker

 

Correct Answer: B

 

 

QUESTION 466

Which of the following operating systems can be upgraded using an in-place procedure to

Windows 7 Professional x64?

 

A.      Windows Vista Professional x86

B.      Windows 7 Enterprise x64

C.      Windows 7 Starter x86

D.      Windows 7 Home Premium x64

 

Correct Answer: D

 

 

QUESTION 467

Social engineering makes use primarily of which of the following techniques, to bypass common

corporate security barriers?

 

A.      Grayware installation

B.      Worm transmission

C.      Human interaction

D.      Malware installation

 

Correct Answer: C

 

 

QUESTION 468

A technician is having issues with a corporate wireless signal bleeding into nearby offices. Which

of the following techniques could be used to mitigate the risk of wireless attacks by third parties

in the nearby offices?

 

A.      Switch from 802.11b to 802.11g spectrums.

B.      Disable WEP-128 security.

C.      Radio power adjustment.

D.      Switch from 802.11g to 802.11n spectrums.

 

Correct Answer: C

 

 

 

QUESTION 469

A user needs to replicate a large directory containing folders and files from one drive to another.

It also contains several empty folders needed for future growth. Which of the following

commands should a technician use in order to accomplish this task?

 

A.      ATTRIB /S

B.      RD /S

C.      COPY /A

D.      XCOPY /E

 

Correct Answer: D

 

 

QUESTION 470

Which of the following devices would provide the GREATEST security to a server room?

 

A.      Keycode pad

B.      Retinal scanner

C.      Badge reader

D.      Mantrap

 

Correct Answer: B

 

 

Comments are closed.