Which of the following components are used to store data? (Select TWO).
A. Motherboard
B. RAM
C. CPU
D. GPU
E. SSD
A user is setting up an older wireless access point that has only WEP for encryption.
Which of the following additional steps will help to secure the network? (Select TWO).
A. Disable SSID broadcast.
B. Refresh the MAC address.
C. Filter the MAC address.
D. Refresh the IP address.
E. Use CAT6 cables.
An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized access.
Which of the following BEST protects against data theft in this instance?
A. Security software
B. Full disk encryption
C. Cable lock
D. Username and password
E. Patching the OS and third party software
Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?
A. Thermal
B. Laser
C. Dot matrix
D. Inkjet
Which of the following is MOST likely required during installation in order to legally install software?
A. Automatic updates
B. Service level agreement
C. License key
D. Antivirus software
Which of the following is considered an optical storage medium?
A. SSD
B. Blu-Ray
C. Flash drive
D. Memory card
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email.
Which of the following precautions could be taken to mitigate this issue?
A. Only browse the Internet on WiFi connections that use WPA2
B. Turn off the guest account in the operating system
C. Disable autofill functionality within the web browser
D. Remove any legacy browsers from the computer
Which of the following is performed during WiFi setup on a mobile device?
A. Configuring bluetooth pairing settings
B. Configuring email settings
C. Configuring screen lock settings
D. Configuring SSID settings
A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads.
Which of the following is the MOST likely cause?
A. The browser is incompatible with the website
B. The workstation has been infected with malware
C. The website is not secured by SSL
D. The certificate of the website has expired
Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?
A. Hacking
B. Phishing
C. Spam
D. Cracking