CompTIA A+ Core 2 Objective 2.10 – Security – Browser Config and Security

Posted by:

|

On:

|

Browser Config and Security

1 / 15

When installing browser extensions, what red flag indicates that an extension might be from an untrusted source?

2 / 15

An employee uses a shared computer to conduct sensitive research. Which browser feature should be used to ensure that browsing history and data do not remain on the computer?

3 / 15

An IT professional is downloading a critical software update for the company’s server. To ensure the integrity and authenticity of the downloaded file, which of the following actions should the IT professional take BEFORE installation?

4 / 15

An organization’s IT department notices an increase in security incidents traced back to malicious browser extensions. What policy should be implemented to mitigate this risk?

5 / 15

A company implements a password manager for its employees to store and manage their passwords. What practice should employees follow to maximize the security benefits of using a password manager?

6 / 15

While making an online purchase, a user notices a warning that the site’s certificate is not valid. What should be the user’s NEXT step to ensure their transaction is secure?

7 / 15

While attempting to install a new browser extension, a user encounters several sources offering the download. Which of the following indicators should the user look for to determine a trustworthy source?

8 / 15

To protect user privacy and security, what routine maintenance should be performed on web browsers?

9 / 15

An IT specialist is configuring a web browser to ensure secure connections for online transactions. Which setting should be prioritized?

10 / 15

An organization allows employees to use multiple devices for work. To ensure seamless access to bookmarks and settings, the IT department recommends using browser data synchronization. What security measure is MOST important to protect this synchronized data?

11 / 15

An IT technician needs to update the web browser on all company computers to ensure compatibility with new web applications. What is the MOST secure method to obtain the latest browser version?

12 / 15

Before making an online payment, what should a user verify in the browser to ensure the website is secure?

13 / 15

A user installs an ad blocker to prevent intrusive advertisements. However, some ads still appear while browsing. What is the MOST likely reason for this issue?

14 / 15

A user notices that web applications are loading slowly on their browser. What is a recommended step to potentially improve performance?

15 / 15

To improve browsing speed and user experience on company computers, the IT department decides to implement an ad blocker. What is the PRIMARY benefit of this action?

Your score is

Exit