1.
Which of the following is a security best practice?
2.
Which of the following Linux commands is used to configure an Ethernet address?
3.
A technician has cleaned a virus infection off of a PC using corporate approved software. After a short period of time, the infection returned. Updated virus signatures have also detected the presence of a rootkit. Which of the following would be the BEST course of action to resolve the issue?
4.
SIMULATION You need to configure your mobile device to send and receive electronic messages from your company. You must use the company's WLAN as all e-mail services are on default non-secure ports. The company's WLAN is broadcasting across the company for easier access. Both incoming and outgoing servers requires login credentials. These are the proper parameters: Username: tech@techies.com Password: P@$$w0rd Outgoing server: mail.techies.com Incoming server: pop3.techies.com Company SSID: Techies 40-bit Key: CA:FE:33:71:00 Instructions: When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue. Correct Answer: Please review explanation for detailed answer. Section: Mix Questions Explanation Explanation/Reference: Explanation: A technician is installing a new router at a computer that wants to protect the configuration of the DMZ. To prevent unauthorized remote access, which of the following should the technician perform when installing a new wireless router?
5.
A user wants to see the file extensions for all files when navigating the desktop's file structure. Which of the following Control Panel utilities should the technician access to configure the display of file extensions?
6.
A corporate customer has contacted a technician about a database issue. After a reboot, no one can connect to the database. When the technician arrives on-site, the database service is not started. The technician starts the service, and the database comes up without issue. After some testing, the technician realizes the database service is coming up to quickly on startup before dependent services can start. Which of the following is the BEST solution?
7.
A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?
8.
A technician wants to delete all information from a laptop so it is not recoverable, but needs to repurpose the laptop drive for future use. Which of the following is the BEST option to accomplish this task?
9.
To prevent electrical damage to a PC while working on it, which of the following should be disconnected before work begins?
10.
A technician is running a Cat 5 cable from the IDF to a user's PC in the office. Which of the following should the technician use for safety reasons?