Which of the following is a likely policy change resulting from this incident?
Multiple laptops that contain confidential data are stolen from a company. Which of the
following is a likely policy change resulting from this incident?
Which of the following BEST describes the security threat taking place?
A user receives an email formatted to appear as if the bank sent it. The email explains that
the user must confirm the name, address, and social security number listed on the bank
account. Which of the following BEST describes the security threat taking place?
Which of the following precautions could be taken to mitigate this issue?
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy
access to all of her banking and email. Which of the following precautions could be taken to
mitigate this issue?
Which of the following should be done to ensure that unauthorized changes cannot be made?
A user is configuring a new wireless router. Which of the following should be done to ensure
that unauthorized changes cannot be made?
Which of the following would BEST be described as password best practices?
Which of the following would BEST be described as password best practices? (Select
THREE).
Which of the following describes this type of security threat?
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the
following describes this type of security threat?
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is
considered:
Which of the following security threats occurs when a user receives an email from an illegitimate source askin
Which of the following security threats occurs when a user receives an email from an
illegitimate source asking for login information?
Which of the following are best practices when it comes to using a computer in a public location?
Which of the following are best practices when it comes to using a computer in a public
location? (Select TWO).
Which of the following BEST describes the type of account Joe should create for his roommate?
Joe, a user, wishes to allow his roommate to access his personal computer for Internet
browsing, but does not want his roommate to have the ability to make changes to the
system. Which of the following BEST describes the type of account Joe should create for
his roommate?