Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
1.Because of a recent string of thefts in your office, you need to harden your local system. What two actions are most appropriate for your situation? (Choose two.)
CorrectIncorrect -
Question 2 of 20
2. Question
2.What option can you configure on your workstation to increase security when you leave your desk?
CorrectIncorrect -
Question 3 of 20
3. Question
3.You have just landed at an airport and have an unexpected six-hour layover. You want to use your smartphone to get some work done. What should you disable as a precautionary device-hardening measure to help prevent potential attacks? (Choose two.)
CorrectIncorrect -
Question 4 of 20
4. Question
4.Claire, a co-worker, is browsing the Internet and wants to know whether it’s safe to enter her credit card information into a website. What do you tell her to look for?
CorrectIncorrect -
Question 5 of 20
5. Question
5.You enabled file encryption on your local computer. While you were on vacation, one of your co-workers managed to get onto your computer and share your important files with other users. How did they do this?
CorrectIncorrect -
Question 6 of 20
6. Question
6.Which of the following types of data should be considered confidential and handled appropriately? (Choose two.)
CorrectIncorrect -
Question 7 of 20
7. Question
7.Which type of software will help protect your computer from malicious network traffic?
CorrectIncorrect -
Question 8 of 20
8. Question
8.You are using Google Chrome, and you want to ensure that when you type in your first name to a web page, all of your other information fills in the fields for you. What should you do?
CorrectIncorrect -
Question 9 of 20
9. Question
9.Your manager just got a new workstation. He wants to know which user accounts he should disable to increase security. What should you tell him to disable?
CorrectIncorrect -
Question 10 of 20
10. Question
10.Which of the following actions is not considered a web browsing best practice?
CorrectIncorrect -
Question 11 of 20
11. Question
11.The managers at your company have decided to implement stricter security policies on the company’s local network. Which of the following should they do? (Choose two.)
CorrectIncorrect -
Question 12 of 20
12. Question
12.Your co-worker Rachel has recently discovered that when she starts typing her name into a field in a web browser, her whole name appears as well as her address in the appropriate boxes. What is this due to?
CorrectIncorrect -
Question 13 of 20
13. Question
13.You have been asked to give training on network security. For your section on password management, which options should you recommend to users? (Choose two.)
CorrectIncorrect -
Question 14 of 20
14. Question
14.You are in a library that has free computers to use for Internet browsing. Which of the following should you possibly be concerned about?
CorrectIncorrect -
Question 15 of 20
15. Question
15.You have remotely logged into your corporate network. Which of the following is used to ensure encryption of data in transit between your laptop and corporate servers?
CorrectIncorrect -
Question 16 of 20
16. Question
16.Which of the following are considered characteristics of a strong password? (Choose two.)
CorrectIncorrect -
Question 17 of 20
17. Question
17.You just read an article about an Internet worm recently causing problems. What type of software should you install to protect yourself from this worm?
CorrectIncorrect -
Question 18 of 20
18. Question
18.You receive an email in your inbox from your friend Sara. The title of the email is “This is so cool!” and inside the email is an attachment with an .exe extension. What should you do?
CorrectIncorrect -
Question 19 of 20
19. Question
19.You recently received a new workstation and need to secure it properly before browsing the Internet. Which actions should you take? (Choose two.)
CorrectIncorrect -
Question 20 of 20
20. Question
20.Which of the following statements is true regarding web browser plugins, toolbars, and
extensions?
CorrectIncorrect