1.
Which of the following security threats does NOT use software to extract sensitive information or credentials?
2.
Which of the following features helps to prevent shoulder surfing?
3.
A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?
4.
For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?
5.
Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?