QUESTIONS WITH VERIFIED ANSWERS
A college student logs onto a college computer for the first time.
Which security policy category should be presented to the student?
- RIGHT ANSWER -acceptable use policies
A customer uses Internet Explorer and Microsoft Edge as
browsers on the computer. The customer asks the technician how
to configure the computer to detect and filter phishing websites,
to analyze websites for suspicious items, and to check downloads
against a list of known malicious files and sites. Which web
security feature should the technician demonstrate? - RIGHT
ANSWER -SmartScreen Filter
A high technology company has an issue with unauthorized people
gaining access into the company by following an authorized
employee through the secure entrance. Which two measures could
help with this security breach? (Choose two.) - RIGHT ANSWER
-mantrap security guard that checks IDs
A manager approaches a PC repair person with the issue that
users are coming in to the company in the middle of the night to
play games on their computers. What might the PC repair person
do to help in this situation? - RIGHT ANSWER -Limit the login times.
A newly created company has fifteen Windows 10 computers that
need to be installed before the company can open for business.
, What is a best practice that the technician should implement when
configuring the Windows Firewall? - RIGHT ANSWER -After
implementing third party security software for the company, the
technician should verify that the Windows Firewall is disabled.
A retail store wants to secure laptops that are on display. The
store manager also wants a record of which employees enter the
backroom where inventory is kept. Which security option would
work best for this situation? - RIGHT ANSWER -cable locks and a
token-based lock on the backroom
A SOHO company has hired a technician to come in and configure
and secure the computers. The technician has decided to
configure a local security policy for the machines. Which setting
would the technician use to ensure that the user did not make their
password the same as their own user account name? - RIGHT
ANSWER -meet complexity requirements
A technician has been asked by a manager to recommend a
security solution for protecting a computer against adware
programs. Which security technique should the technician
recommend? - RIGHT ANSWER -antimalware
A technician has been asked by a manager to recommend a
security solution for protecting a computer against adware
programs. Which security technique should the technician
recommend? - RIGHT ANSWER -antimalware