Which of the following threats to personal information uses stolen information to make purchases or obtain loans?
Which of the following threats to personal information uses stolen information to make purchases or obtain loans?A . Identity theftB . CyberbullyingC . Financial fraudD . Social engineering attackView AnswerAnswer: C
What do web browsers check when verifying the validity of an X.509 certificate?
What do web browsers check when verifying the validity of an X.509 certificate?A . subjectAltNameB . Expiration date and issuerC . Key usageD . SubjectView AnswerAnswer: B
Which of the following backup types is best suited for daily use?
Which of the following backup types is best suited for daily use?A . Synthetic backupB . Full backupC . Incremental backupD . Differential backupView AnswerAnswer: C
Which of the following is a technology used for sending and receiving encrypted emails in Mozilla Thunderbird?
Which of the following is a technology used for sending and receiving encrypted emails in Mozilla Thunderbird?A . SMTPB . OpenPGP and S/MIMEC . POP3D . IMAPView AnswerAnswer: B
Which of the following is a security implication of physical access to a computer?
Which of the following is a security implication of physical access to a computer?A . Unauthorized access to dataB . Improved processor performanceC . Decreased memory capacityD . Increased network speedView AnswerAnswer: A
Which of the following solutions would be the most appropriate for providing secure remote access?
You work for a large company that has employees who need to access the company network from remote locations. Which of the following solutions would be the most appropriate for providing secure remote access?A . An organization-specific VPNB . Setting up an open Wi-Fi networkC . Using plaintext email for...
What type of attack is this?
You suspect that someone has been intercepting and reading the network traffic on your home WiFi network. What type of attack is this?A . Distributed Denial of Service (DDoS)B . DoSC . Traffic interceptionD . BotnetView AnswerAnswer: C
Which security measure should you implement to help ensure data privacy?
You are tasked with securely storing backups of sensitive data in a cloud service. Which security measure should you implement to help ensure data privacy?A . Physical security measures for the cloud serverB . Encryption of backups before uploading to the cloud serviceC . Two-factor authentication for accessing backupsD ....
Which of the following is an example of an administrative control?
Which of the following is an example of an administrative control?A . FirewallsB . Biometric scannersC . Password policiesD . Intrusion detection systemsView AnswerAnswer: C
Which of the following is a key feature of BitLocker?
Which of the following is a key feature of BitLocker?A . Free and open-sourceB . Cross-platform supportC . Integrated with WindowsD . Encrypts only filesView AnswerAnswer: C