Which of the following is a security threat that uses email to trick users?
A. Phishing
B. Virus
C. Spyware
D. Shoulder surfing
CompTIA exam questions
Which of the following is a security threat that uses email to trick users?
A. Phishing
B. Virus
C. Spyware
D. Shoulder surfing
The technician is dispatched to a multi-function device that users print and copy from all day. The technician is told pages that are copied all have a line on them on the left hand side of the page. The technician prints a printer test page and does not see the line on the page. The technicians NEXT step would be which of the following?
A. Replace the toner cartridge to eliminate the lines.
B. Print from another workstation to recreate the problem.
C. Close the trouble ticket and document no trouble found.
D. Copy a printed page to recreate the problem.
A company has created a personal SSL certificate for an internal website and a user is reporting error messages when accessing the site. In which of the following locations could a technician troubleshoot SSL certificate errors?
A. System Protection
B. Folder Options->View Hidden Files
C. Internet Options->Content
D. Local Security Policy
A user reports they have no display on their laptop. Which of the following would be checked FIRST in order to narrow down the issue?
A. Swap displays with an extra laptop.
B. Plug an external monitor into the laptop, press the appropriate function keys, and look for an output display.
C. If the power indicator lights are lit assume the motherboard is good and order a replacement display.
D. Remove the display bezel and ensure the display connector is in place.
Which of the following would be the BEST format for optical media?
A. FAT32
B. EXT3
C. CDFS
D. NTFS
A client has a Windows Vista PC that has several unused programs that run on startup. Which of the following utilities can a technician use to disable these programs from running at startup?
A. Default programs
B. Performance information and tools
C. Performance Monitor
D. Device Manager
A SOHO would like to limit usage of their wireless network to two computers. Which of the following would be the EASIEST way for a technician to accomplish this?
A. Assign static IP addresses
B. Change the signal strength
C. Disable unused ports on the router
D. Enable MAC filtering
Which of the following commands should Karen, a technician, use to examine and restore protected system files?
A. SFC
B. RECOVER
C. REPLACE
D. COPY
In order to establish a VPN to a company firewall, Peter, a technician needed to have an RSA token and provide a user name and password to connect to the main office. This is an example of:
A. Privacy filters.
B. Extensive security.
C. Two-factor authentication.
D. Basic authentication.
A user attempts to remote into their machine at night but cannot connect. The user believes that someone is unplugging their computer from the network at night and plugging in a personal machine. Which of the following security measures would BEST prevent this behavior from continuing?
A. Limit the port to a specific MAC address.
B. Set the port to only activate during business hours.
C. Disable DHCP on the network router.
D. Deactivate the port that is being used from the switch.