1) Which of these would be most associated with a content policy? a) A schedule of normal work hours b) An organizational chart of executives c) The sign-in procedures for the data center d) A list of web sites that are blocked by default 2) Which of these would be the best method of minimizing electrostatic discharge? a) Keep all work surfaces clean b) Use non-magnetic tools c) Unplug all power sources prior to working inside of the computer d) Maintain a humidity level over 60% 3) Which of these would be the best way to dispose of a used UPS battery? a) Add to the weekly recycling pickup b) Return to the battery manufacturer c) Send to a local hazardous waste facility d) Store in a secure area 4) Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested? a) RADIUS b) TACACS c) Single-Factor d) Multi-Factor 5) Which of the following uses technology to manage the use of software? a) DRM b) EULA c) URL d) PII 6) A user working from home is not able to print to a laser printer at the corporate office. Which of the following would be the most likely reason for this issue? a) DLP policy b) Outdated anti-virus signatures c) Disconnected VPN d) MDM configuration 7) An internal audit has found that a server in the DMZ has been participating in DDoS attacks against external devices. What type of Malware would be MOST likely found on this server? a) Worm b) Rootkit c) Botnet  d) Spyware e) Keylogger 8) In the context of multi-factor authentication, which option is NOT an example of something a user has? a) Password b) Cell phone with authentication app c) Software token d) Credit card 9) What term can be defined as a buffer area between an unsecured and secured areas? a) Mantrap b) Security Guard c) Entry Control Roster d) Privacy Screen 10) Which of the following options can be used to restrict what devices can be physically connected to a network based on a MAC address? a) Port security b) Access Control Lists c) Switch filtering d) Firewall 11) A laptop PC is frequently turning off without warning resulting in a black screen and no error messages. Where can you look inside Windows for a possible reason? a) Control Panel > Windows Settings > Logs and Failures b) syslog.msc c) Event Viewer d) ipconfig /all /history 12) One form of malware is disguised as an application that users unwittingly download and run, which leads to a virus. This form of malware is referred to as ____. a) phishing b) adware c) trojan d) rainbow table 13) Which of the following is MOST likely to be specified as a system requirement for the installation of a photo editing application a) HDD speed b) RAM quantity c) Network bandwidth d) CPU compatibility 14) A user is attempting to install an application and receives an error stating there is not enough space to install the application. a) Installation method b) System requirements c) OS compatibility d) File permissions 15) A network administrator needs to manage a switch and firewall at a remote location. Which of the following would be the BEST choice for this requirement? a) RDP b) Telnet c) SSH d) DMZ 16) Which option starts the operating system with a minimal set of drivers? a) Windows RE b) System Restore c) Safe Mode d) Startup Repair 17) An application won’t close on an Android smartphone. You’ve tried to force stop it—to no avail. What should you do? a) Hard reset the device. b) Stop the underlying service in Running Services. c) Soft reset the device. d) Take the device to an authorized service center 18) You want a cost-effective solution to the common surges that can affect your computer. Which device offers the best solution? a) UPS b) Surge suppressor c) Power strip d) Rack Grounding 19) Which of the following is the strongest password? a) |ocrian# b) Marqu1sD3S0d c) This1sV#ryS3cure d) Thisisverysecure

1102 Practice Test Questions

โดย

ลีดเดอร์บอร์ด

สไตล์ภาพ

ตัวเลือก

สลับแม่แบบ

คืนค่าการบันทึกอัตโนมัติ: ใช่ไหม