1.
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?
2.
A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?
3.
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?
4.
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:
5.
When operating under optimal network conditions, which of the following has the HIGHEST reliability?
6.
A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the user's browser?
7.
Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?
8.
Which of the following BEST describes the pros and cons of a home wired network?
9.
A technician has just finished setting up a SOHO wireless router but the client does not want the PC on the wireless network for security reasons. The technician connects an RJ-45 cable to the computer and the router, but does not receive network connectivity. Which of the following is the NEXT step to diagnose the problem?
10.
Which of the following is an advantage of using cloud-based collaborative applications and storage, rather than local applications and storage?