Which of the following is the BEST security practice to…
Which of the following is the BEST security practice to use when configuring the management options of a wireless router?
Which of the following tasks should be considered to he…
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?
Which of the following BEST describes this situation?
A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which
of the following BEST describes this situation?
Which of the following does this warning indicate about…
While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing.
Which of the following does this warning indicate about the website?
Which of the following should the user do in the future…
An attacker cracks a user’s password for all social media, email, and bank accounts. The user needs to change the passwords for all these accounts. Which of the
following should the user do in the future to prevent this from happening?
Which of the following is the cause of the problem?
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to
an unfamiliar website. She clears all temporary files and deletes the history, but this continues to occur. Which of the following is the cause of the problem?
which of the following reasons?
A user is configuring a SOHO wireless router. The user should change the router’s default administrator password for which of the following reasons?
Which of the following BEST describes the type of accou…
Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make
changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?
Which of the following are best practices when it comes…
Which of the following are best practices when it comes to using a computer in a public location? (Select TWO).
Which of the following security threats occurs when a u…
Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?