A company decides to implement two-factor authentication on all of the company computers. In addition to a user password, which of the following is a commonly used item to implement two-factor authentication?
A. Retinal scanner
B. Key Lock
C. RSA token
D. Privacy Filter
A laser printer is printing images tilted on the page. Which of the following components is the cause of the problem?
A. Paper registration assembly
B. Toner cartridge
C. Laser scanner assembly
D. Fusing assembly
A user reports that their printouts contain a shadow of the previous image. Which of the following is MOST likely the cause?
A. Separation pads
B. Fuser assembly
C. Corona wire
D. Pickup assembly
A technician would MOST likely use Windows PE on a Windows 7 system to perform which of the following functions?
A. Install new programs outside of the OS
B. Fix file system issues outside of the OS
C. Print specialized reports of processes starting at boot
D. Install new hardware with appropriate drivers
A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
A. War driving
B. Social engineering
C. Shoulder surfing
D. Phishing
Which of the following is typically the MOST difficult security threat to remove?
A. Spyware
B. Virus
C. Trojan
D. Rootkit
With default settings in Windows 7 64-bit which of the following groups is allowed to install unsigned drivers while giving the LEAST amount of permissions?
A. Authenticated User
B. Administrator
C. Power User
D. Standard User
If a customer wants to create a multi-boot PC with different editions of Windows, which of the following is MOST important to consider?
A. Using multiple partitions
B. Using multiple hard drives
C. Using a single partition
D. Using a PXE boot scheme
A technician is responding to a user reporting corrupted files. Which of the following should the technician do to determine the problem?
A. Ensure all Windows updates are installed
B. Perform a backup of all drives
C. Run CHKDSK
D. Run defragmentation
Which of the following are examples of physical security? (Select the two best answers.)
A. Directory permissions
B. RSA token
C. Principle of least privilege
D. Privacy filter