A retail store wants to secure laptops that are on display. The store manager also wants a record of which employees enter the backroom where inventory is kept. Which security option would work best for this situation?

  • cable locks and a token-based lock on the backroom
How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?
  • Operate the web browser in private browser mode.

A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?

  • The laptop is infected by a virus.
Which type of firewall serves as a relay between users and servers on the Internet, inspects all traffic, and allows or denies traffic based on a set of rules?
  • proxy firewall
When would a PC repair person want to deploy the idle timeout feature?
  • when users are leaving their desk but remaining logged on

A system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?

  • EFS
After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?
  • Check for the latest OS patches and updates.

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

  • DDoS

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

    A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)

    • mantrap
    • security guard that checks IDs
    A file called new_resume has the following file permissions: rw-r-x–x . What two facts can be determined from these permissions? (Choose two.)
    • Members of the group have read and executed access to the file.

    An instructor is discussing facts about different mobile device operating software. The instructor states: “When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled.” To which OS does this relate: iOS, Android, or both?

    • both

    An instructor is discussing facts about different mobile device operating software. The instructor states: To synchronize a mobile device to a PC, iTunes must be installed on the PC. To which OS does this relate: iOS, Android, or both?

    • iOS

    An instructor is discussing facts about different mobile device operating software. The instructor states: The start voice control function can be performed with the home button. To which OS does this relate: iOS, Android, or both?

    • iOS

    An instructor is discussing facts about different mobile device operating software. The instructor states: Remote backups are a cloud-enabled service for mobile devices. To which OS does this relate: iOS, Android, or both?

    • both

    An instructor is discussing facts about different mobile device operating software. The instructor states: WIFI hotspots are a location data source that can be used by locator apps to determine the position of a mobile device. To which OS does this relate: iOS, Android, or both?

    • both

    An instructor is discussing facts about different mobile device operating software. The instructor states: The icon on the Home screen is a shortcut to the app. To which OS does this relate: iOS, Android, or both?

    • Android

    An instructor is discussing facts about different mobile device operating software. The instructor states: This OS uses the system bar, displayed at the bottom of every screen, to navigate apps and screens. To which OS does this relate: iOS, Android, or both?

    • Android

    An instructor is discussing facts about different mobile device operating software. The instructor states: The mobile devices have a feature called Spotlight that is a search tool that provides information from many sources. To which OS does this relate: iOS, Android, or both?

    • iOS