When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?
A. Phishing
B. Virus attack
C. License theft
D. Social engineering
正解:C
質問 2:
Ann, a user, has an external monitor that will not turn on. Her laptop has activity lights and is plugged into the same power strip. Which of the following should be checked FIRST to begin troubleshooting this issue?
A. The power strip
B. The monitor power cable
C. The laptop power cable
D. The monitor video cable
正解:B
質問 3:
A user receives an email containing a link. When they hover the mouse over the link, the actual URL does not match the text in the body of the email and appears to be a string of random characters. Which of the following is the BEST course of action?
A. Delete the email without clicking on the link.
B. Reply to the sender asking for confirmation that it is safe to open.
C. Forward the email to a friend to ask for advice.
D. Click the link because malware protection software is installed on the computer.
正解:A
質問 4:
Which of the following commands is used to view the contents of a file?
A. Copy
B. Open
C. Save
D. Move
正解:B
質問 5:
A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads. Which of the following is the MOST likely cause?
A. The workstation has been infected with malware
B. The certificate of the website has expired
C. The website is not secured by SSL
D. The browser is incompatible with the website
正解:A
質問 6:
Which of the following file formats contain other files within them? (Select TWO).
A. tiff
B. png
C. dmg
D. mp3
E. iso
F. flac
正解:C,E
質問 7:
Ann, a user, is browsing shopping websites on the Internet when she receives a pop-up message on her screen indicating a virus has been detected by the antivirus software. Which of the following actions should be performed NEXT?
A. Minimize the alert and continue browsing the Internet.
B. Clear temporary files and folders.
C. Run a scan on the entire local drive.
D. Ignore the message because it is likely adware.
正解:C
質問 8:
A home user wants to share files between two different computers.
The user wants the files to be available to either computer, regardless of whether either computer is turned on.
Which of the following is the BEST storage method?
A. Direct attached storage
B. Internal storage
C. Network attached storage
D. USB storage
正解:C
Kurosawa -
問題集にある問題がたくさん出てきました。Pass4Testの問題集は信頼できます。試験に合格しました。ありがとうございます。