1. A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?
A) A. Only browse the Internet on WiFi connections that use WPA2 B) B. Turn off the guest account in the operating system C) C. Disable autofill functionality within the web browser D) D. Remove any legacy browsers from the computer
2. A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?
A) A. Change the SSID B) B. Change the router - s address C) C. Change the administrator password D) D. Change the encryption key
3. Which of the following would BEST be described as password best practices? (Select THREE).(Select 3answers)
A) A. Use of long passwords B) B. Sharing passwords with a trusted source C) C. Limiting password reuse D) D. Keeping default passwords E) E. Use of special characters F) F. Writing down difficult passwords
4. A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?
A) A. Malware B) B. Social engineering C) C. Spam D) D. Physical security
5. Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:
A) A. adware B) B. spyware C) C. ransomware D) D. phishing
Leave a comment