You are working as a technician at Certkiller .com. You have been asked to replace all CRT monitors with LCD monitors in the HR department. In the process of doing this, you observe that many in the staff uses screen savers that you know is adware. The company does not have a policy addressing outside screen saver use. Which of the following is the best action to take?
You work as a technician at Certkiller .com. You have been asked to troubleshoot a workstation that is running slowly but with the hard drive light constantly blinking. The TASK MANAGER tells you that the system idle time is using the majority of processor time. Which of the following is MOST likely the cause?
You are working as a technician at Certkiller .com. You are asked to help a user at a branch office with an application problem. You try to connect to a users desktop using Remote Assistance but is unable to connect and the invitation keeps timing out and you suspect that the firewall is blocking your request. Which of the following ports should you confirm that it is open for traffic in the firewall in order to allow Remote Assistance?
You work as a technician with an IT-security responsibility at Certkiller .com. You have decided to inform the users at Certkiller .com about IT-Security and what to do to prevent security breaches. When talking about social engineering you want to use an example, which of the following would be most suitable?
You are working as a technician at Certkiller .com. One of Certkiller 's users is unable to log in to the domain as she has forgotten her password. Certkiller .com has a security policy that says the last four digits of the employees identification number must be verified before performing a password reset. This rule exists in order to protect the company against social engineering attacks. The user is not able to provide that information over the telephone call. Which of the following would be the BEST way to handle this request?
You are working as a technician at Certkiller .com. You boss asks you to identify a possible social engineering attack from the following alternatives. Which alternative would you point out?
You are working as a technician at Certkiller .com. You are asked to help a customer that reports that he is unable to access his email. Before contacting the user you check the status of the email service with the postmaster at Certkiller .com. The postmaster states that there are technical problems and that email is temporarily unavailable. Once you have this information you contact the user and tell him about the situation. When the user hears this he suggests that the technician should send an email to the rest of the staff at his department, advising them about the problem, the technician should:
As a technician at Certkiller .com you receive a telephone call from a user stating that a cord from the back of the computer fell off and that she is unsure where to reconnect the cord. As a technician, which of the following would be the FIRST thing to do?
You are working as a technician at Certkiller .com. You have just assisted a user with some troubleshooting but the user is not satisfied with the solution that has been offered. What would be the best way to handle this situation?
You are working as a technician at Certkiller .com. You are assigned a task to help a user in the marketing department. Once you call the user and question him about the trouble he is experiencing you realize that the problem is outside the scope of the company's support. You should advise the customer that: