CompTIA A+ Core 2 Objective 2.10 – Security – Browser Config and Security

Posted by:

|

On:

|

Browser Config and Security

1 / 15

An employee uses a shared computer to conduct sensitive research. Which browser feature should be used to ensure that browsing history and data do not remain on the computer?

2 / 15

A company implements a password manager for its employees to store and manage their passwords. What practice should employees follow to maximize the security benefits of using a password manager?

3 / 15

A user notices that web applications are loading slowly on their browser. What is a recommended step to potentially improve performance?

4 / 15

While attempting to install a new browser extension, a user encounters several sources offering the download. Which of the following indicators should the user look for to determine a trustworthy source?

5 / 15

An organization’s IT department notices an increase in security incidents traced back to malicious browser extensions. What policy should be implemented to mitigate this risk?

6 / 15

An IT technician needs to update the web browser on all company computers to ensure compatibility with new web applications. What is the MOST secure method to obtain the latest browser version?

7 / 15

To improve browsing speed and user experience on company computers, the IT department decides to implement an ad blocker. What is the PRIMARY benefit of this action?

8 / 15

When installing browser extensions, what red flag indicates that an extension might be from an untrusted source?

9 / 15

While making an online purchase, a user notices a warning that the site’s certificate is not valid. What should be the user’s NEXT step to ensure their transaction is secure?

10 / 15

Before making an online payment, what should a user verify in the browser to ensure the website is secure?

11 / 15

An IT professional is downloading a critical software update for the company’s server. To ensure the integrity and authenticity of the downloaded file, which of the following actions should the IT professional take BEFORE installation?

12 / 15

An organization allows employees to use multiple devices for work. To ensure seamless access to bookmarks and settings, the IT department recommends using browser data synchronization. What security measure is MOST important to protect this synchronized data?

13 / 15

An IT specialist is configuring a web browser to ensure secure connections for online transactions. Which setting should be prioritized?

14 / 15

To protect user privacy and security, what routine maintenance should be performed on web browsers?

15 / 15

A user installs an ad blocker to prevent intrusive advertisements. However, some ads still appear while browsing. What is the MOST likely reason for this issue?

Your score is

Exit