View Mode
Q: 1
Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into revealing confidential or private information?
Options
Q: 2
Jenny recently switched from broadband cable Internet to ADSL service with her local phone company. To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the Internet. Which setting should she check first?
Options
Q: 3
Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?
Options
Q: 4
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college’s Wi-Fi for network access. What security risk is associated with this implementation?
Options
Q: 5
Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?
Options
Q: 6
You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks. Which term describes this wireless network device name?
Options
Q: 7
Server-based networks typically contain centralized network resources, which are usually not available on peer-to-peer (P2P) networks. Which of the following examples describes a server based network?
Options
Q: 8
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic- looking but imposter Web site?
Options
Q: 9
What does the following represent? 2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34
Options
Q: 10
You are a computer technician supporting a small 15-computer Internet lab. The computers are regularly used to browse the Internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary Internet files. Which of the following is a way to easily delete all the temporary Internet files?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE