Which of the following is a requirement to connect a smartphone to a wireless network?
A user learns of an operating system vulnerability that would allow a hacker to access the computer. The user would like to keep the operating system up to date to prevent such vulnerabilities from occurring. Which of the following should the user configure?
A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads. Which of the following is the MOST likely cause?
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?
A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following BEST describes this type of malware infection?
While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website?
A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?
Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?
Which of the following operating systems is very lightweight and relies heavily on Internet applications?
A user is updating a website. Which of the following protocols will provide the MOST security when uploading the files?
Which of the following storage media provides the FASTEST speeds when backing up large data files?
A technician needs to troubleshoot a user’s computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated?
An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using?
Which of the following is a file on a computer that links to another program or file somewhere else on the same computer?
After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?
A user installed a new scanner on a desktop personal computer without any documentation. The scanner powers on, the lamp turns on, and then the unit stops with a failure light lit. Which of the following should the user do FIRST?
A user has finished setting up a new computer. Now the operating system requires activation, but the user discovers the computer has no Internet connection. Which of the following should the user do FIRST?
Which of the following BEST describes the pros and cons of a home wired network?
Which of the following is an advantage of using cloud-based collaborative applications and storage, rather than local applications and storage?
Which of the following connections provide data with the MOST secure protection from interception?
Which of the following protocols is used to secure communications between sender and receiver?
Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?