Practice test #3 Flashcards

Security

1
Q
QUESTION NO: 47
A user has a username and password to log onto a banking website. The user would like to keep
access to the account as secure as possible. Which of the following security best practices should
the user follow? (Select TWO).
A.
Use only public computers to access the website
B.
Create a complex password
C.
Change the default password
D.
Write the password down
E.
Use the original password
A

Answer: B,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QUESTION NO: 48
A user, Ann, is experiencing slow browsing on a website she frequently visits that displays
constant pop-up ads. Which of the following is the MOST likely cause?
A.
The browser is incompatible with the website
B.
The workstation has been infected with malware
C.
The website is not secured by SSL
D.
The certificate of the website has expired

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QUESTION NO: 49
A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can
only see her search bars and plug-ins. Which of the following is the MOST likely source of this
issue?
A.
The computer does not have current antivirus software installed
B.
The computer needs to have its components upgraded
C.
The downloaded toolbars are filling the browser screen
D.
The owner was not using complex passwords

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
QUESTION NO: 50
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should
be shared cautiously and only with trusted resources?
A.
Email address
B.
Phone number
C.
Mother’s maiden name
D.
Last name
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
QUESTION NO: 51
A user will be traveling with a smartphone that contains confidential information. Which of the
following should be disabled? (Select TWO).
A.
Keyboard
B.
Speakers
C.
Mouse
D.
Bluetooth
E.
NFC
A

Answer: D,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
QUESTION NO: 52
A technician wants to minimize the risk of having third parties track previously visited web pages.
Which of the following should be performed in the Internet browser’s settings? (Select TWO).
A.
Select form data
B.
Disable location services
C.
Remove cookies
D.
Clear history
E.
Change passwords
A

Answer: C,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QUESTION NO: 53
When setting up a new device, there are multiple features available that will never be used. Which
of the following should the user do to make the new device more secure?
A.
Make all users administrators.
B.
Remove or disable the unnecessary features.
C.
Install a password manager on the device.
D.
Make all users guests

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

QUESTION NO: 54
Joe, a user, saves a document to a flash drive on his computer in order to print the document from
a public computer kiosk. After returning home and reinserting the flash drive in his computer, the
security software identifies an infected file on the flash drive. Which of the following is the MOST
likely cause of the infection?
A.
The flash drive was infected by a war driving hacker on the way to the public kiosk.
B.
The public workstation was infected by Joe’s flash drive.
C.
The public workstation was infected and passed the virus to the flash drive.
D.
The flash drive was already infected by the user’s computer.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
QUESTION NO: 55
A user is browsing the Internet when suddenly a threatening message appears on screen
demanding a payment in order to avoid the system being disabled. Which of the following BEST
describes this type of malware infection?
A.
Ransomware
B.
Adware
C.
Spyware
D.
Virus
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

QUESTION NO: 56
Which of the following is an example of ransomware?
A.
A user is asked to pay a fee for a password to unlock access to their files.
B.
CompTIA FC0-U51 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 29
A user receives an email demanding payment for a trial application that has stopped working.
C.
A user has opened an Internet browser and is taken to a site that is not the normal home page.
D.
A user is asked to open an attachment that verifies the price of an item that was not ordered.

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
QUESTION NO: 57
An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized access.
Which of the following BEST protects against data theft in this instance?
A.
Security software
B.
Full disk encryption
C.
Cable lock
D.
Username and password
E.
Patching the OS and third party software
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
QUESTION NO: 58
Multiple laptops that contain confidential data are stolen from a company. Which of the following is
a likely policy change resulting from this incident?
A.
Enabling full disk encryption
B.
Requiring screensaver password
C.
Disabling Bluetooth adapters
D.
Adding multifactor authentication
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
QUESTION NO: 59
A user receives an email formatted to appear as if the bank sent it. The email explains that the
user must confirm the name, address, and social security number listed on the bank account.
Which of the following BEST describes the security threat taking place?
A.
Shoulder surfing
B.
Social engineering
C.
Spam
D.
Phishing
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

QUESTION NO: 60
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access
to all of her banking and email. Which of the following precautions could be taken to mitigate this
issue?
A.
Only browse the Internet on WiFi connections that use WPA2
B.
Turn off the guest account in the operating system
C.
Disable autofill functionality within the web browser
D.
Remove any legacy browsers from the computer

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
QUESTION NO: 61
A user is configuring a new wireless router. Which of the following should be done to ensure that
unauthorized changes cannot be made?
A.
Change the SSID
B.
Change the router’s address
C.
Change the administrator password
D.
Change the encryption key
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
QUESTION NO: 62
Which of the following would BEST be described as password best practices? (Select THREE).
A.
Use of long passwords
B.
Sharing passwords with a trusted source
C.
Limiting password reuse
D.
Keeping default passwords
E.
Use of special characters
F.
Writing down difficult passwords
A

Answer: A,C,E

17
Q
QUESTION NO: 63
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the
following describes this type of security threat?
A.
Malware
B.
Social engineering
C.
Spam
D.
Physical security
A

Answer: B

18
Q
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is
considered:
A.
adware
B.
spyware
C.
ransomware
D.
phishing
A

Answer: B

19
Q
QUESTION NO: 65
Which of the following security threats occurs when a user receives an email from an illegitimate
source asking for login information?
A.
Hacking
B.
Phishing
C.
Spam
D.
Cracking
A

Answer: B

20
Q

QUESTION NO: 66
Which of the following are best practices when it comes to using a computer in a public location?
(Select TWO).
A.
Notify the administrator when finished.
B.
Use strong passwords.
C.
Turn off the computer when finished.
D.
Disable the save password function on web pages.
E.
Make sure to clean the keyboard when finished.
F.
Make sure to log out of websites when done.

A

Answer: D,F

21
Q
QUESTION NO: 67
Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing,
but does not want his roommate to have the ability to make changes to the system. Which of the
following BEST describes the type of account Joe should create for his roommate?
A.
Standard
B.
Guest
C.
Administrator
D.
Power user
A

Answer: B

22
Q

QUESTION NO: 68
A user is configuring a SOHO wireless router. The user should change the router’s default
administrator password for which of the following reasons?
A.
To prevent improper data transmission encryption
B.
To prevent unauthorized configuration changes
C.
To prevent social engineering attacks
D.
To increase wireless signal strength

A

Answer: B

23
Q

QUESTION NO: 69
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet
browser and tries to go to her home page. Instead, she is sent to an unfamiliar website. She clears
all temporary files and deletes the history, but this continues to occur. Which of the following is the
cause of the problem?
A.
The company has configured a policy on her computer that forces her to stay on their website.
B.
Her computer is infected with adware and is redirecting her browser to another site.
C.
The memory of the browser is corrupt, and she needs to have the browser reinstalled.
D.
She did not reboot her computer after clearing the temporary files.

A

Answer: B

24
Q
QUESTION NO: 70
An attacker cracks a user's password for all social media, email, and bank accounts. The user
needs to change the passwords for all these accounts. Which of the following should the user do
in the future to prevent this from happening?
A.
Disable unused browser toolbars.
B.
Clear the browser cache.
C.
Avoid credential reuse.
D.
Delete tracking cookies.
A

Answer: C

25
Q

QUESTION NO: 71
While browsing the Internet, a user receives a warning regarding the display of mixed content. The
address bar includes https, and the lock symbol is showing. Which of the following does this
warning indicate about the website?
A.
It stores data in cache or cookies, but not both.
B.
It requires login credentials for some sections.
C.
It contains both secure and non-secure parts.
D.
It is best viewed with a different browser.

A

Answer: C

26
Q
QUESTION NO: 72
A technician is typing the password to logon to a system. A user is standing in close proximity to
the technician and is able to see the password being typed. Which of the following BEST
describes this situation?
A.
Dumpster diving
B.
Shoulder surfing
C.
Phishing
D.
Social engineering
A

Answer: B