Which of the following should be done to ensure that unauthorized changes cannot be made?
A user is configuring a new wireless router. Which of the following should be done to ensure
that unauthorized changes cannot be made?
Which of the following would BEST be described as password best practices?
Which of the following would BEST be described as password best practices? (Select
THREE).
Which of the following describes this type of security threat?
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the
following describes this type of security threat?
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is
considered:
Which of the following security threats occurs when a user receives an email from an illegitimate source askin
Which of the following security threats occurs when a user receives an email from an
illegitimate source asking for login information?
Which of the following are best practices when it comes to using a computer in a public location?
Which of the following are best practices when it comes to using a computer in a public
location? (Select TWO).
Which of the following BEST describes the type of account Joe should create for his roommate?
Joe, a user, wishes to allow his roommate to access his personal computer for Internet
browsing, but does not want his roommate to have the ability to make changes to the
system. Which of the following BEST describes the type of account Joe should create for
his roommate?
which of the following reasons?
A user is configuring a SOHO wireless router. The user should change the router’s default
administrator password for which of the following reasons?
Which of the following is the cause of the problem?
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an
Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar
website. She clears all temporary files and deletes the history, but this continues to occur.
Which of the following is the cause of the problem?
Which of the following should the user do in the future to prevent this from happening?
An attacker cracks a user’s password for all social media, email, and bank accounts. The
user needs to change the passwords for all these accounts. Which of the following should
the user do in the future to prevent this from happening?