1.
What are best practices while installing and securing a new system for a home user? (Select THREE).
2.
Which of the following is a major reason that social engineering attacks succeed?
3.
Which security action should be finished before access is given to the network?
4.
Which of the following types of backups requires that files and software that have been changed since the last full backup be copied to storage media?
5.
Which port must be open to allow a user to login remotely onto a workstation?
6.
The authentication process where the user can access several resources without the need for multiple credentials is known as:
7.
Which item best describes an instance where a biometric system identifies legitimate users as being unauthorized?
8.
The purpose of the SSID in a wireless network is to:
9.
Which of the following is the best description about the method of controlling how and when users can connect in from home?
10.
Which of the following would be the MOST common method for attackers to spoof email?