1.
Which of the following security threats does NOT use software to extract sensitive information or credentials?
2.
Which of the following features helps to prevent shoulder surfing?
3.
A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?
4.
For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?
5.
Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?
6.
A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company's content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?
7.
Which of the following is BEST used to prevent other people from viewing a user's computer screen?
8.
A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
9.
Which of the following security threats is BEST mitigated through proper user training?
10.
The practice of following an authorized person through an entrance without using a badge to defeat security is called: