Which of the following scenarios BEST defines phishing?
Which of the following scenarios BEST defines phishing?
Which of the following would be the BEST way to combat social engineering?
Which of the following would be the BEST way to combat social engineering?
Which of the following is considered a method of physical security?
Which of the following is considered a method of physical security?
Which of the following options can be selected from the Windows Update website?
A user wants to quickly install the most recent security patch released. Which of the following
options can be selected from the Windows Update website?
Which of the following has the HIGHEST level rights?
Which of the following has the HIGHEST level rights?
Which of the following allows a user to reset their password with a series of security questions that only the
Which of the following allows a user to reset their password with a series of security questions that
only the user should know?
Which of the following will allow only known workstations to connect to the SOHO router?
A user gets a warning from their ISP about illegally downloading copyrighted movies. The user
insists that they did not download any movies and calls a technician to implement stronger small
office home office (SOHO) security. Which of the following will allow only known workstations to
connect to the SOHO router?
Which of the following would the technician implement on the SOHO router to prevent the broadcast?
A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to
ensure that the webcam is not broadcasting externally. Which of the following would the technician
implement on the SOHO router to prevent the broadcast?
Which of the following is the MOST secure option that a technician could implement to resolve this issue?
A user installed a new SOHO router and new wireless NICs to increase their transmission speed
from 802.11b to 802.11g with the manufacturer’s default settings. The user lives in an apartment
building and is still experiencing slowness to the Internet after the installations. Which of the
following is the MOST secure option that a technician could implement to resolve this issue?
Which of the following can be implemented?
A user wants to prevent access to specific websites to prevent their children from accidently
accessing them. Which of the following can be implemented?