What security measure should you take to protect your information?
You are using a public Wi-Fi network at a coffee shop to access sensitive information. What security measure should you take to protect your information?A . Use a weak password for your accountsB . Share your login credentials with others using the same Wi-Fi networkC . Leave your computer unattended...
Which protocol is used to translate domain names into IP addresses?
Which protocol is used to translate domain names into IP addresses?A . DHCPB . SMTPC . 802.11D . DNSView AnswerAnswer: D
What is Trusted Computing?
What is Trusted Computing?A . A protocol for secure communication between devicesB . A method for encrypting data on a physical mediumC . A security standard for IoT devicesD . A set of hardware and software technologies to enhance securityView AnswerAnswer: D
What is the primary goal of an attacker who interrupts services, such as by launching a Distributed Denial of Service (DDoS) attack?
What is the primary goal of an attacker who interrupts services, such as by launching a Distributed Denial of Service (DDoS) attack?A . To manipulate or delete dataB . To extort ransom from the targeted organizationC . To cause a disruption in the availability of the targeted system or serviceD...
Which of the following threats to personal information uses stolen information to make purchases or obtain loans?
Which of the following threats to personal information uses stolen information to make purchases or obtain loans?A . Identity theftB . CyberbullyingC . Financial fraudD . Social engineering attackView AnswerAnswer: C
What do web browsers check when verifying the validity of an X.509 certificate?
What do web browsers check when verifying the validity of an X.509 certificate?A . subjectAltNameB . Expiration date and issuerC . Key usageD . SubjectView AnswerAnswer: B
Which of the following backup types is best suited for daily use?
Which of the following backup types is best suited for daily use?A . Synthetic backupB . Full backupC . Incremental backupD . Differential backupView AnswerAnswer: C
Which of the following is a technology used for sending and receiving encrypted emails in Mozilla Thunderbird?
Which of the following is a technology used for sending and receiving encrypted emails in Mozilla Thunderbird?A . SMTPB . OpenPGP and S/MIMEC . POP3D . IMAPView AnswerAnswer: B
Which of the following is a security implication of physical access to a computer?
Which of the following is a security implication of physical access to a computer?A . Unauthorized access to dataB . Improved processor performanceC . Decreased memory capacityD . Increased network speedView AnswerAnswer: A
Which of the following solutions would be the most appropriate for providing secure remote access?
You work for a large company that has employees who need to access the company network from remote locations. Which of the following solutions would be the most appropriate for providing secure remote access?A . An organization-specific VPNB . Setting up an open Wi-Fi networkC . Using plaintext email for...