Sienna works as a receptionist in an enterprise. One day, she saw a suspicious person wandering around the reception area. What should she do first?
She should shout at him so that everyone will notice that he shouldn't be there.
She should interact with him appropriately so that he knows he is being observed.
She should immediately call security or the police.
She should physically intercept or impede him.
You are working as a cybersecurity administrator for your country's government. You are asked to block certain websites in your country deemed critical of those in power. Which of the following methods should you use?
You submitted a network security review report for your organization. After an inspection, the report was returned for corrections with comments from the organizational head. The review report you sent was a pdf file, whereas the returned report was a Microsoft Word file. Word warns you that the file might not be safe to open. Which of the following actions should you take to prevent a possible macros attack?
Designate the file as a trusted document
Move the file to a trusted location
Delete the file permanently
Open the file in protected view
In an interview, you are asked about the objective of Microsoft Office's protected view function. Which of the following should be your answer?
To protect your eyes from blue light strain
To protect your devices from physical damage
To protect your files from unauthorized access
To protect your devices from infections
What is a session ID?
A session ID is a unique number that a web server assigns to a specific user for the duration of the user's visit.
A session ID is a unique number that an administrator assigns to a specific user for the duration of the user's visit.
A session ID is a unique number that an ISP assigns to a specific user for the duration of the user's visit.
A session ID is a unique number that a web browser assigns to a specific user for the duration of the user's visit.
You are asked to create a certificate signing request for a website that your organization recently developed. Which of the following tools should you use?
Which of the following best describes two-person integrity control?
Assigning two individuals as the head of the organization
Assigning two administrators to a single server
Allowing only two people to access specific resources at one time
Assigning two security guards to protect the building
Which of the following tools has a graphical user interface (GUI)?
ou are a security expert asked to install physical security equipment in your enterprise. This device should ensure that employee devices are protected from unauthorized access when they are away. Which equipment should you install?
Protected cable distribution