Which of the following should be disabled?
A user will be traveling with a smartphone that contains confidential information. Which of
the following should be disabled? (Select TWO).
Which of the following should be performed in the Internet browser’s settings?
A technician wants to minimize the risk of having third parties track previously visited web
pages. Which of the following should be performed in the Internet browser’s settings?
(Select TWO).
Which of the following should the user do to make the new device more secure?
When setting up a new device, there are multiple features available that will never be used.
Which of the following should the user do to make the new device more secure?
Which of the following is the MOST likely cause of the infection?
Joe, a user, saves a document to a flash drive on his computer in order to print the
document from a public computer kiosk. After returning home and reinserting the flash drive
in his computer, the security software identifies an infected file on the flash drive. Which of
the following is the MOST likely cause of the infection?
Which of the following BEST describes this type of malware infection?
A user is browsing the Internet when suddenly a threatening message appears on screen
demanding a payment in order to avoid the system being disabled. Which of the following
BEST describes this type of malware infection?
Which of the following is an example of ransomware?
Which of the following is an example of ransomware?
Which of the following BEST protects against data theft in this instance?
An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized
access. Which of the following BEST protects against data theft in this instance?
Which of the following is a likely policy change resulting from this incident?
Multiple laptops that contain confidential data are stolen from a company. Which of the
following is a likely policy change resulting from this incident?
Which of the following BEST describes the security threat taking place?
A user receives an email formatted to appear as if the bank sent it. The email explains that
the user must confirm the name, address, and social security number listed on the bank
account. Which of the following BEST describes the security threat taking place?
Which of the following precautions could be taken to mitigate this issue?
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy
access to all of her banking and email. Which of the following precautions could be taken to
mitigate this issue?