A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled.
Which of the following BEST describes this type of malware infection?
A. Ransomware
B. Adware
C. Spyware
D. Virus
An RoHS label on hardware indicates which of the following?
A. The hardware produces EMI when used.
B. The hardware is certified to be energy efficient.
C. The hardware provides battery backup for power outages.
D. The hardware needs to be properly disposed.
Which of the following permissions is required to run a .bat file?
A. Delete
B. Execute
C. Write
D. Modify
A user has downloaded an application file with the .dmg file extension.
Which of the following operating systems can be used with this file by default?
A. iOS
B. Windows
C. Mac OS
D. Chrome OS
Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?
A. Large USB flash drive connected to a PC
B. Medium capacity SATA hard drive
C. Network attached storage appliance
D. Firewall with security management
A technician is trying to access a user's files and is unable to open any folder or file.
Which of the following BEST describes the situation?
A. The folders contain older versions of the files.
B. The files are corrupted.
C. The technician needs to change the file attributes.
D. The technician does not have permissions.
A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can only see her search bars and plug-ins.
Which of the following is the MOST likely source of this issue?
A. The computer does not have current antivirus software installed
B. The computer needs to have its components upgraded
C. The downloaded toolbars are filling the browser screen
D. The owner was not using complex passwords
A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed.
Which of the following BEST describes this situation?
A. Dumpster diving
B. Shoulder surfing
C. Phishing
D. Social engineering
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?
A. Email address
B. Phone number
C. Mother's maiden name
D. Last name
By default, which of the following types of operating systems can automatically detect a user's location while the user is traveling in a bus?
A. Server
B. Desktop workstation
C. Virtual server
D. Mobile
When operating under optimal network conditions, which of the following has the HIGHEST reliability?
A. Bluetooth
B. Wired
C. Cellular
D. WiFi
Which of the following could be described as both an input and output device?
A. Flat-screen monitor
B. Multi-function printer
C. Microphone
D. Scanner
Which of the following protocols is used to secure communications between sender and receiver?
A. SIP
B. SNMP
C. SSL
D. SMTP
A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads.
Which of the following is the MOST likely cause?
A. The browser is incompatible with the website
B. The workstation has been infected with malware
C. The website is not secured by SSL
D. The certificate of the website has expired
A user is at the office and has a cellular phone that previously functioned properly. The phone is powered on with a fully charged battery. However, the phone does not have connectivity.
Which of the following describes the problem?
A. Phone is disconnected from WiFi
B. Provider is conducting system testing
C. MAC address is bad
D. Phone is in airplane mode