1.
After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Which of the following Windows 7 functions will resolve this?
2.
A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?
3.
Which of the following resources is MOST important for accessing remote virtual environments on a client machine?
4.
A computer program that functions normally while quietly installing malicious software on a machine is known as a:
5.
Which of the following security threats is BEST mitigated through proper user training?
6.
A user sent an email requesting that a technician check if a computer is on and connected to the Internet so the user can login from home. Which of the following commands in the command prompt would a technician use to verify if the computer is on and connected without having to go to the computer?
7.
A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions?
8.
A technician gets a call from a customer stating that their computer will not boot. They are getting the following error "invalid system disk". Which of the following should the technician check FIRST?
9.
The practice of following an authorized person through an entrance without using a badge to defeat security is called:
10.
Turnstiles and other mantraps will prevent which of the following security threats?