1. Which of the following is a common way to prevent physical theft of a laptop or workstation?
A) A. Shred any sensitive information to prior to disposal. B) B. Avoid storing passwords near the computer. C) C. Practice good awareness skills when entering passwords/PINs. D) D. Cable and lock device securely attached to a solid object.
2. Ann, a user, is browsing shopping websites on the Internet when she receives a pop-up message on her screen indicating a virus has been detected by the antivirus software. Which of the following actions should be performed NEXT?
A) A. Ignore the message because it is likely adware. B) B. Run a scan on the entire local drive. C) C. Clear temporary files and folders. D) D. Minimize the alert and continue browsing the Internet.
3. A technician needs to troubleshoot a users computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated?
A) A. Password confidentiality B) B. Password complexity C) C. Password reuse D) D. Password expiration
4. Joe, a user, has many applications on his computer and is trying to use software management best practices. Which of the following should he consider?
A) A. Install a desktop cleanup application. B) B. Uninstall unneeded applications. C) C. Load each application one at a time. D) D. Manage the use of internal memory.
5. A user's government identification number, birth date, and current address are considered which of the following?
Leave a comment