Which of the following BEST describes the type of accou…
Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make
changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?
Which of the following are best practices when it comes…
Which of the following are best practices when it comes to using a computer in a public location? (Select TWO).
Which of the following security threats occurs when a u…
Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?
Malware that has an embedded keylogger to capture all o…
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:
Which of the following describes this type of security …
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?
Which of the following would BEST be described as passw…
Which of the following would BEST be described as password best practices? (Select THREE).
Which of the following should be done to ensure that un…
A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?
Which of the following precautions could be taken to m…
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following
precautions could be taken to mitigate this issue?
Which of the following BEST describes the security thre…
A user receives an email formatted to appear as if the bank sent it. The email explains that the user must confirm the name, address, and social security number
listed on the bank account. Which of the following BEST describes the security threat taking place?
Which of the following is a likely policy change result…
Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?