Which of the following is a good practice for device passwords
Avoid single words, or a word preceded or followed by a single number (e.g. Password1). Hackers will use dictionaries of words and commonly used passwords to guess your password.
Which of the following is the most common form of authentication
Passwords are the most common methods of authentication. Passwords can be in the form of a string of letters, numbers, or special characters.
Which of the following security practices are the best example of the principle of least privilege
Which of the following practices are the BEST example of the principle of least privilege? All users on a Windows workstation are limited user except for one user, who is responsible for maintaining the system.
Which of the following are the 3 pillars of security investigation
The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.
Which of the following protocols would you use to provide security for employees that access an organizations systems remotely from home
Which protocol would be used to provide security for employees that access systems remotely from home?
- SCP. Explanation: Various application layer protocols are used to for communications between systems. A secure protocol provides a secure channel over an unsecured network.
What three best practices can help defend against social engineering attacks
What three best practices can help defend against social engineering attacks? Do not provide password resets in a chat window. Resist the urge to click on enticing web links. Educate employees regarding policies.
Which of the following is the best definition of a security vulnerability
A Security Vulnerability is a weakness, flaw, or error found within a security system that has the potential to be leveraged by a threat agent in order to compromise a secure network.
Which of the following identifies the type of access that is allowed or denied for an object
Permissions define the rights and access users and groups have with objects. Which of the following identifies the type of access that is allowed or denied for an object? Permissions define the rights and access users and groups have with objects. Permissions are applied to objects such as files and folders.
Which three protocols can use AES
Which three protocols can use Advanced Encryption Standard (AES)? (Choose three.)
- WEP. Explanation: Various protocols can be used to provide secure communication systems. AES is the strongest encryption algorithm.
Which of the following are often identified as the three main goals of security select three
Confidentiality, integrity, and availability (known as CIA, the CIA triad, and the security triangle) are the three main goals when it comes to information security.
Which of the following is one of the most common attacks on employees
Which of the following is one of the MOST common attacks on employees? Phishing attacks are one of the most common attacks directed at employees. In most cases, employees are lured into clicking a link or downloading an attachment from a seemingly legitimate email.
Which of the following is the most important thing to do to prevent console access to the router
Which of the following is the most important thing to do to prevent console access to the router? Keep the router in a locked room.
What is a good practice that helps keep laptop secure quizlet
–Use a different password for each device. -Store passwords as contacts in a smartphone's address book. -Use cached information to recall passwords. -Keep your password written near your devices.
What are the characteristics of a weak password
7 Characteristics of Weak Passwords (Infographic)
- Repeating previously used passwords.
- Names of close family members or friends.
- Your name.
- Words in the dictionary.
- Common names.
- Repeating your login code.
- Keyboard patterns and swipes (i.e., 123456 or QWERTY)
Which of the following is the best solution to allow access to private resources from the Internet
Which of the following is the BEST solution to allow access to private resources from the internet? A VPN provides a secure outside connection to an internal network's resources.
Which of the following do security templates allow you to do select two
Which of the following do security templates allow you to do? (Select two.) Security templates allow you to quickly and consistently apply settings to multiple computers in order to bring them into compliance with a security baseline.
Which of the following is a password that relates to things that people know such as a mothers maiden name or the name of a pet
Cognitive passwords are passwords that relate to things that people know, such as a mother's maiden name, or the name of a pet.