and Answers
Which of the following is used for temporary storage of program data that is
cleared when the computer is turned off?
System memory
Which of the following methods of patching allows for vendor controlled updates,
reduced user interaction, and increased security of the operating system or
application?
Automatic updates
Which of the following security threats would the use of cable locks reduce?
Hardware theft
Which of the following is a reason why password complexity is a best practice?
It makes passwords harder to crack.
A user receives an email containing a link. When they hover the mouse over the
link, the actual URL does not match the text in the body of the email and appears
to be a string of random characters. Which of the following is the BEST course of
action?
Delete the email without clicking on the link.
Which of the following components serves as temporary storage for computer
operations?
Random access memory
The extension .rtf is an example of which of the following file types?
Document
Which of the following is a common way to prevent physical theft of a laptop or
workstation?
Cable and lock device securely attached to a solid object.
After installing a new software application, a user notices that the application
launches in demo mode. Which of the following needs to be done to fully activate
the software package?
Enter a product or license key.
A user's laptop hard drive contains sensitive information. The user often plugs
the laptop into the corporate network. A sensitive file from the laptop has been
found on another user's laptop. How could the user have prevented this breach?
Disable file and print sharing on the laptop.
A user's government identification number, birth date, and current address are
considered which of the following?
PII
Which of the following is the function of a CPU?
Performs data computation
When trying to activate the operating system, a user receives a notice that the
software is not genuine. Which of the following security threats has occurred?
License theft