the computer, the user notices many games and applications are pre-installed. To
reduce security concerns, which of the following should the user complete?
• A. Perform a System Restore
• B. Call the computer manufacturer.
• C. Remove the unwanted bloatware.
• D. Check for disk fragmentation.
C. Remove the unwanted bloatware
A company is looking into ways to ensure only approved users are able to access
the company website on devices. Which of the following would work BEST to
achieve this goal?
• A. Creating certificates
• B. Disabling the browser's cache
• C. Configuring proxy settings
• D. Installing antivirus extensions
A. Creating certificates
Which of the following would be the BEST design construct to allow developers to
group functions and properties for reuse when designing an application?
• A. Constant
• B. Vector
• C. Function
• D. Class
D. Class
A replay attack would be the primary concern of:
• A. availability.
• B. authentication.
• C. confidentiality.
• D. integrity.
D. integrity
A network administrator requires that a non-magnetic drive be used to store critical
data for a project. The project is expected to last a few years. Which of the following
would the administrator MOST likely choose for the project?
• A. USB flash drive
• B. Solid-state drive
• C. Tape drive
• D. Hard disk
, B. Solid-state drive
Which of the following graphic interfaces is capable of the HIGHEST possible
resolution?
• A. Component video
• B. VGA
• C. S-Video
• D. DVI
D. DVI
A technician is configuring computers for a mass deployment. As part of a web-
based application, several new windows need to open once a user logs in. Which of
the following should the technician configure to ensure the browsers open properly?
• A. Unrestricted PowerShell execution policy
• B. Pop-up blocker exceptions
• C. Applications to run in private mode
• D. Security extensions setting to disable
B. Pop-up blocker exceptions
Which of the following software types is MOST likely to use stencil files?
• A. Visual diagramming
• B. Word processing
• C. Presentation
• D. Conferencing
A. Visual diagramming
Which of the following availability concerns is mitigated by having a business
continuity site?
• A. Service outage
• B. Wiretapping
• C. Eavesdropping
• D. Replay attack
A. Service outage
The manager of human resources is unable to connect to the wireless network while
in the conference room. The network administrator decides to check the logs of the
network. While in the log files, the administrator finds that several access points are
down. Which of the following troubleshooting steps should be performed NEXT?
• A. Identify the problem
• B. Research the knowledge base.