Filters
Question type

Study Flashcards

While researching a network issue, Randy discovered a diagram that he can use to see the design of the network.    What type of documentation did Randy discover?


A) Network topology
B) Inventory management
C) Knowledge base
D) Architectural drawing

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Zach believes someone is trying to log in to a computer system in order to gain access to the company's network. He wants to use Windows to determine if that is the case. ​ Where can Zach go to check the security logs?


A) NTbtlog.txt
B) Event Viewer
C) Antivirus security logs
D) Action Center

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Gwen has discovered a program that has copied itself throughout the network. The program does not appear to have a host program and is overloading the network as it replicates. It has even installed a web server on the network and is allowing other computers to connect.   What type of malware has Gwen discovered?


A) Worm
B) Trojan
C) Spyware
D) Rootkit

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Hector is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. When he opens the Action Center, Hector realizes that Windows Defender has been disabled and another antivirus software is running. Hector does not recognize the other antivirus software. ​ What type attack has infected Hector's computer?


A) Spam
B) Security alert
C) Hijacked email
D) Rogue antivirus

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Holly is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. She notices a problem when she tries to update Windows Defender and it fails. When Holly opens the Action Center she sees this screen. Holly is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. She notices a problem when she tries to update Windows Defender and it fails. When Holly opens the Action Center she sees this screen.   What has happened to Holly's computer? A)  She has received a spam message. B)  She has received a security alert message. C)  Someone has hijacked her email. D)  She has downloaded a rogue antivirus. What has happened to Holly's computer?


A) She has received a spam message.
B) She has received a security alert message.
C) Someone has hijacked her email.
D) She has downloaded a rogue antivirus.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Recently, Jessica has been receiving reports at the help desk that clients cannot log in to their computers and need to rest their passwords. After checking the log file, Jessica decided to ask one client who had recently changed his password, why he decided to change it. The client reported that someone from the help desk had called him and asked him for his password two days ago. He gave the caller the password, and now he can't log in to his system. Jessica has discovered that the client was a victim of social engineering. ​ What can the company do to prevent this from happening again?


A) Educate users.
B) Use multifactor authentication.
C) Install anti-malware software.
D) Install firewall software.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Allison's computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a folder in the Documents library of her user account. Allison tried to take ownership of the folder but was still denied access. She tried running an antivirus scan on the folder, and again access to the folder was denied. ​ What can Allison do to fix this security issue?


A) Restart the computer and try to gain access after the restart.
B) Copy the folder to a flash drive and run a scan on the flash drive.
C) Boot into Safe Mode and run the scan.
D) Run a Windows Defender Offline scan.

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Dylan is working on a system that has been having issues with files. Recently, Dylan has noticed that some of the filenames have strange characters, and the file sizes seem to be excessively large. File have been disappearing and Windows system files have been changed. ​ What might be the problem with the computer?


A) The hard drive is failing.
B) Windows OS has become corrupt.
C) Malware is corrupting the files.
D) The computer has become part of a botnet.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Jerry was recently contacted by a coworker who received an email that seemed suspicious. Jerry investigated her email account and noticed that she had been sending hundreds of emails every day for a week. He also noticed that this problem started after the coworker sent a reply email agreeing to participate in a contest to win a free car wash. ​ What happened to the coworker's email account?


A) Her email was spoofed.
B) Her email was hijacked.
C) She has been added to a botnet.
D) She turned off the spam filer.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Roger's company is trying to increase the level of security for its network. Roger is researching ways to increase the security by making passwords more complex. ​ What can Roger change in Windows to require more complex passwords?


A) Group Policy
B) Organizational unit
C) Password Policy
D) Access control List

E) All of the above
F) None of the above

Correct Answer

verifed

verified

David would like to add extra security to his network device. He is afraid that someone might try and connect an unauthorized device to the network via an open network drop. ​ What type of security can David deploy to prevent this type of security issue from occurring?


A) Port filtering
B) MAC filtering
C) VPN
D) Access control list

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 61 - 71 of 71

Related Exams

Show Answer