Question: 13
A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?
A. Quick format
B. FDISK
C. Low level format
D. Standard format
Answer: C
Question: 14
An attack that creates a website that looks like another website, with the purpose of learning someone’s account information is called which of the following?
A. Virus
B. Shoulder surfing
C. Trojan
D. Phishing
Answer: D
Question: 15
Which of the following terms BEST describes the software or hardware used to manage virtual machines?
A. Hypervisor
B. Cloud Server Manager
C. Supervisor
D. Virtual Disk Manager
Answer: A
Question: 16
A technician is required to change a setting for HKEY_Local_Machine. Which of the following would the technician use to change this?
A. BCEDIT
B. WEP setup
C. MSCONFIG
D. REGEDIT
Answer: D
Question: 17
A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following types of RAID is MOST likely in use?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
Answer: A
A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?
A. Quick format
B. FDISK
C. Low level format
D. Standard format
Answer: C
Question: 14
An attack that creates a website that looks like another website, with the purpose of learning someone’s account information is called which of the following?
A. Virus
B. Shoulder surfing
C. Trojan
D. Phishing
Answer: D
Question: 15
Which of the following terms BEST describes the software or hardware used to manage virtual machines?
A. Hypervisor
B. Cloud Server Manager
C. Supervisor
D. Virtual Disk Manager
Answer: A
Question: 16
A technician is required to change a setting for HKEY_Local_Machine. Which of the following would the technician use to change this?
A. BCEDIT
B. WEP setup
C. MSCONFIG
D. REGEDIT
Answer: D
Question: 17
A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following types of RAID is MOST likely in use?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
Answer: A
No comments:
Post a Comment
Note: only a member of this blog may post a comment.