1.
Which of the following security threats involve shoulder surfing and phone phishing?
2.
Which of the following operating systems supports full usage of 8GB DDR3 RAM?
3.
A technician would like to ensure all previous data is erased before reloading Windows 7 Home Premium onto a laptop. Which of the following procedures would accomplish this?
4.
Which of the following commands, in Windows 7, could a technician use to schedule a disk integrity scan upon next boot?
5.
Which of the following tabs under MSCONFIG would allow a technician to configure all of the applications that launch at boot?
6.
A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?
7.
A user gets a warning from their ISP about illegally downloading copyrighted movies. The user insists that they did not download any movies and calls a technician to implement stronger small office home office (SOHO) security. Which of the following will allow only known workstations to connect to the SOHO router?
 
8.
A virtual machine running locally would be BEST utilized in which of the following situations?
9.
Which of the following BEST describes the security term known as tailgating?
10.
Which of the following devices is MOST likely to come standard with a solid state hard drive?