1. Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?
A) A. Email address B) B. Phone number C) C. Mother's maiden name D) D. Last name
2. A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).(Select 2answers)
A) A. Keyboard B) B. Speakers C) C. Mouse D) D. Bluetooth E) E. NFC
3. A technician wants to minimize the risk of having third parties track previously visited web pages. Which of the following should be performed in the Internet browsers settings? (Select TWO).(Select 2answers)
A) A. Select form data B) B. Disable location services C) C. Remove cookies D) D. Clear history E) E. Change passwords
4. When setting up a new device, there are multiple features available that will never be used. Which of the following should the user do to make the new device more secure?
A) A. Make all users administrators. B) B. Remove or disable the unnecessary features. C) C. Install a password manager on the device. D) D. Make all users guests.
5. Joe, a user, saves a document to a flash drive on his computer in order to print the document from a public computer kiosk. After returning home and reinserting the flash drive in his computer, the security software identifies an infected file on the flash drive. Which of the following is the MOST likely cause of the infection?
A) A. The flash drive was infected by a war driving hacker on the way to the public kiosk. B) B. The public workstation was infected by Joe - s flash drive. C) C. The public workstation was infected and passed the virus to the flash drive. D) D. The flash drive was already infected by the user's computer.
Leave a comment