U61 Security Best Practices fully solved 2023
U61 Security Best Practices fully solved 20231. Due to a recent string of thefts in your office, you need to harden your local system. What two actions are most appropriate for your situation? (Choose two.) A. Install a hardware lock B. Disable unused services C. Install antimalware D. Enable encryption - correct answer 1.A, D. All four answers are device-hardening options. If you are worried about local theft, installing a hardware lock is a must. In addition, if your device does get stolen, encryption will prevent thieves from accessing your files unless they know your username and password. 2. What option can you configure on your workstation to increase security when you leave your desk? A. File encryption B. Multifactor authentication C. Single sign-on D. Screensaver password - correct answer 2. D. A screensaver password will require someone to enter your password to gain access to the computer. File encryption won't help if the attacker has access to the computer as you. 3. You have just landed at the airport and have an unexpected six-hour layover. You want to use your smartphone to get some work done. What should you disable as a precautionary device hardening measure to help prevent potential attacks? (Choose two.) A. Autofill B. Bluetooth C. NFC D. FFC - correct answer 3. B, C. You should disable Bluetooth and Near Field Communications (NFC) to help prevent attacks. Autofill is a browser setting. There is no FFC in this context. .4. Claire, a co-worker, is browsing the Internet and wants to know if it's safe to enter her credit card information into a website. What do you tell her to look for? A. HTTPS:// B. HTTP:// C. SSL:// D. TLS:// - correct answer 4. A. Secure websites start with HTTPS://. Also tell her to look for the lock symbol nearby. 5. You enabled file encryption on your local computer. While you were on vacation, one of your co-workers managed to get on your computer and share your important files with other users. How did they do this? A. They logged on and disabled encryption. B. They used the Disk Recovery tool to access the encrypted files. C. All users logging into the system have access to encrypted files. D. They logged on with your username and password. - correct answer 5. D. The only plausible answer is that someone else had your username and password and logged onto the computer as you. 6. Ray, a co-worker, is concerned that his computer is infected with adware. What symptoms should you tell Ray to look for to confirm his suspicions? (Choose three.) A. Excessive pop-ups B. Browser redirection C. Search engine redirection D. Multifactor login redirection - correct answer 6. A, B, C. Adware can give you a barrage of pop-ups as well as cause browser and search engine redirection. 7. Which type of software will help protect your computer from malicious network traffic? A. Software firewall B. Password complexity tool C. Antispyware D. Antivirus - correct answer 7. A. A software firewall protects your computer against malicious network traffic. Antispyware and antivirus software packages are good, but they protect against malicious programs. 8. You are using Google Chrome and you want to browse a website but not have the website stored in your browsing history. What should you do? A. Log in as someone else to browse the site B. Configure independent browsing C. Use InPrivate
Escuela, estudio y materia
- Institución
- Itf
- Grado
- Itf
Información del documento
- Subido en
- 11 de abril de 2023
- Número de páginas
- 6
- Escrito en
- 2022/2023
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
u61 security best practices fully solved 2023
-
1 due to a recent string of thefts in your office
-
you need to harden your local system what two actions are most appropriate for your situation choos
Documento también disponible en un lote