Which of the following is a characteristic of a secure password?
Which of the following is a characteristic of a secure password?A . Short lengthB . No special charactersC . ComplexityD . Infrequent changesView AnswerAnswer: C
Which of the following should you be particularly aware of when deploying the cloud storage solution?
As the IT administrator of a company, you are responsible for implementing a cloud storage solution. You need to consider the potential issues related to the use of cloud services, especially concerning data synchronization and accessibility. Which of the following should you be particularly aware of when deploying the cloud...
What is a script blocker?
What is a script blocker?A . A browser extension that prevents pop-up windowsB . A browser extension that removes or blocks advertisementsC . A browser extension that blocks scripts from running on websitesD . A browser extension that helps users control and manage cookiesView AnswerAnswer: C
Which of the following is a common source for security incident information and guidance?
Which of the following is a common source for security incident information and guidance?A . Computer Emergency Response Team (CERT)B . Security incident response planC . Risk assessment reportD . IT forensics reportView AnswerAnswer: A
What type of malware is most likely responsible for these symptoms?
Your friend complains that they recently installed a new browser extension to help find online discounts. However, since installing it, they have been experiencing an excessive amount of pop-up ads and unrelated advertising banners on web pages. What type of malware is most likely responsible for these symptoms?A . Trojan...
Which concept ensures that only the intended recipients can read a message?
Which concept ensures that only the intended recipients can read a message?A . End-to-end encryptionB . Transfer encryptionC . TORD . Proxy serversView AnswerAnswer: A
What is an non-disclosure agreement (NDA)?
What is an non-disclosure agreement (NDA)?A . An agreement to not disclose any informationB . A contract that requires sharing confidential information with others in a business relationshipC . An agreement to disclose all informationD . An agreement to disclose some informationView AnswerAnswer: A
Which type of asymmetric encryption algorithm provides better security than an equivalent RSA key of the same size and is commonly used in mobile devices?
Which type of asymmetric encryption algorithm provides better security than an equivalent RSA key of the same size and is commonly used in mobile devices?A . RSAB . Diffie-HellmanC . ECCD . IDEAView AnswerAnswer: C
Which of the following is a network address used to identify devices in layer three of the OSI model?
Which of the following is a network address used to identify devices in layer three of the OSI model?A . TCP port numberB . DNS addressC . MAC addressD . IP addressView AnswerAnswer: D
What is a common function of adware?
What is a common function of adware?A . Encrypting data on a systemB . Stealing sensitive informationC . Displaying unwanted advertisementsD . Providing remote access to a systemView AnswerAnswer: C