Posts

A user is surfing the Internet using a laptop at a public WiFi cafe. What should be checked first when the user connects to the public network?Select one:

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?Select one:

Which configuration on a wireless router is not considered to be adequate security for a wireless network?

How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?

A consumer would like to print photographs stored on a cloud storage account using a third party online printing service. After successfully logging into the cloud account, the customer is automatically given access to the third party online printing service. What allowed this automatic authentication to occur?

What three items are components of the CIA triad? (Choose three.)Select one or more:

Which statement describes cyberwarfare?Select one:

What is a reason that internal security threats might cause greater damage to an organization than external security threats?Select one:

What is an example of "hacktivism"?Select one:A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill.

What is another name for confidentiality of information?Select one:privacy

What three items are components of the CIA triad? (Choose three.)Select one or more: