1.
Which of the following threats uses personalized information in an attempt at obtaining information?
2.
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?
3.
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
4.
A technician is working at a help desk firm and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?
5.
A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?