Q1) How can a virtual assistant be a security risk?
Group of answer choices
- Personal devices could be remotely seen.
- Sensor options could be modified.
- Encryption protocols are not supported.
- Personal information could be leaked.
Q2) Which three passwords are the least secure? (Choose three.)
Group of answer choices
- s3CurE_p@ss
- asdfghjkl
- randolph
- 34%cafe_!
- Ci3c0_RocK$
- 135792468
Q3) How are USB flash drives a security risk?
Group of answer choices
- They contain wireless antennas.
- They have a controller that can be infected.
- They cannot be encrypted.
- They contain a remote sensor.
Q4) Why would an IT person use Zabasearch?
Group of answer choices
- to research a business
- to research an app
- to research a person
- to research an IoT device
Q5) Which action can help reduce online risk?
Group of answer choices
- only accept unsolicited software updates when logged into a secure network
- only click embedded links in email messages from friends
- only conduct transactions on websites after verifying the URL is correct
- only download programs with the most positive reviews on 3rd party websites
Q6) What are three examples of personally identifiable information? (Choose three.)
Group of answer choices
- home water usage
- vehicle identification number
- home thermometer value
- vehicle fuel consumption
- bank account number
- birth date
Q7) Match the security best practice to the description.
Group of answer choices
- implementing human resource security measures : research and perform background checks on employees
- employing access controls: assign user roles and privilege levels
- educating users: train users on security
- regularly testing incident responses: perform and test emergency response scenarios
Q8) Which two online activities pose high security risks? (Choose two.)
Group of answer choices
- using a VPN to access the Internet from a Wi-Fi hot spot
- following email links that have already been scanned by the email server
- creating a very complex password for a new account and storing it in a password manager service
- verifying a banking site URL before entering information
- sharing information on social media
Q9) Which three elements should be combined when creating a strong password? (Choose three.)
Group of answer choices
- personal information
- combinations of letters and numbers
- pet names
- special characters
- dictionary words
- phrases
Q10) What is a goal of performing a risk assessment?
Group of answer choices
- outlining job duties and expectations
- educating users in secure procedures
- valuing assets to justify security expenditures
- restricting access to physical assets
Q11) An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?
Group of answer choices
- Encrypt traffic through a VPN.
- Verify the name of the sender of emails before opening them.
- Only click on embedded links in email messages from trusted colleagues.
- Scan emails with antivirus software.
Q12) What is the goal of a white hat hacker?
Group of answer choices
- protecting data
- modifying data
- stealing data
- validating data
Q13) What is a wireless router security best practice that limits access to only specific internal hosts?
Group of answer choices
- MAC address filtering
- disabling SSID advertisements
- enabling encryption
- enabling the built-in firewall
Q14) What is used to identify a wireless network?
Group of answer choices
- IP address
- MAC address
- SPI
- SSID
Q15) What are two recommended steps to protect and secure a wireless network? (Choose two.)
Group of answer choices
- Use WPA2-AES encryption.
- Locate the wireless router where it is accessible to users.
- Update firmware.
- Use the default SSID.
- Enable remote management.