A) Network topology
B) Inventory management
C) Knowledge base
D) Architectural drawing
Correct Answer
verified
Multiple Choice
A) Worm
B) Trojan
C) Spyware
D) Rootkit
Correct Answer
verified
Multiple Choice
A) The hard drive is failing.
B) Windows OS has become corrupt.
C) Malware is corrupting the files.
D) The computer has become part of a botnet.
Correct Answer
verified
Multiple Choice
A) Restart the computer and try to gain access after the restart.
B) Copy the folder to a flash drive and run a scan on the flash drive.
C) Boot into Safe Mode and run the scan.
D) Run a Windows Defender Offline scan.
Correct Answer
verified
Multiple Choice
A) Educate users.
B) Use multifactor authentication.
C) Install anti-malware software.
D) Install firewall software.
Correct Answer
verified
Multiple Choice
A) Her email was spoofed.
B) Her email was hijacked.
C) She has been added to a botnet.
D) She turned off the spam filer.
Correct Answer
verified
Multiple Choice
A) Port filtering
B) MAC filtering
C) VPN
D) Access control list
Correct Answer
verified
Multiple Choice
A) NTbtlog.txt
B) Event Viewer
C) Antivirus security logs
D) Action Center
Correct Answer
verified
Multiple Choice
A) Spam
B) Security alert
C) Hijacked email
D) Rogue antivirus
Correct Answer
verified
Multiple Choice
A) She has received a spam message.
B) She has received a security alert message.
C) Someone has hijacked her email.
D) She has downloaded a rogue antivirus.
Correct Answer
verified
Multiple Choice
A) Group Policy
B) Organizational unit
C) Password Policy
D) Access control List
Correct Answer
verified
Showing 61 - 71 of 71
Related Exams