Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Question 1
- 3.225 out of 3.225 points
- What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?
- Correct Answer:
- Correctd.
- copyright
- Question 2
- 0 out of 3.225 points
- What software program is an example of password management software? (Choose all that apply.)
- Correct Answers:
- Correctb.
- Dashlane
- Correctc.
- KeePass
- Correctd.
- LastPass
- Question 3
- 3.225 out of 3.225 points
- A person that secretly peaks at your monitor screen while you work may be doing what?
- Correct Answer:
- Correctb.
- shoulder surfing
- Question 4
- 3.225 out of 3.225 points
- What statement regarding passwords on Windows is accurate?
- Correct Answer:
- Correctb.
- by default, accounts with a blank password cannot logon remotely
- Question 5
- 3.225 out of 3.225 points
- Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term?
- Correct Answer:
- Correcta.
- chain of custody
- Question 6
- 3.225 out of 3.225 points
- Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
- Correct Answer:
- Correct True
- Question 7
- 3.225 out of 3.225 points
- What inputs would be considered to be part of a biometric device? (Choose all that apply.)
- Correct Answers:
- Correcta.
- retina
- Correctb.
- fingerprint
- Correctc.
- voice
- Question 8
- 3.225 out of 3.225 points
- After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
- Correct Answer:
- Correct False
- Question 9
- 3.225 out of 3.225 points
- What statement is true regarding the Guest account in Windows 7?
- Correct Answer:
- Correctd.
- it is disabled by default
- Question 10
- 3.225 out of 3.225 points
- CryptoLocker is an example of what type of malware?
- Correct Answer:
- Correctd.
- ransomware
- Question 11
- 3.225 out of 3.225 points
- What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
- Correct Answer:
- Correcta.
- rootkit
- Question 12
- 3.225 out of 3.225 points
- You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
- Correct Answer:
- Correctb.
- tailgating
- Question 13
- 3.225 out of 3.225 points
- On a peer-to-peer network, authentication is the responsibility of the domain.
- Correct Answer:
- Correct False
- Question 14
- 3.225 out of 3.225 points
- What does the presence of the Cydia app on an iOS device indicate?
- Correct Answer:
- Correctb.
- The device has been jailbroken
- Question 15
- 0 out of 3.225 points
- When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.)
- Correct Answers:
- Correcta.
- You should combine uppercase and lower case letters, numbers, and symbols.
- Correctb.
- The password should be at least eight characters long.
- Correctd.
- You should not use adjacent keys on the keyboard, such as asdf.
- Question 16
- 3.225 out of 3.225 points
- One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
- Correct Answer:
- Correctd.
- smart card
- Question 17
- 3.225 out of 3.225 points
- What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
- Correct Answer:
- Correctb.
- degausser
- Question 18
- 3.225 out of 3.225 points
- If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
- Correct Answer:
- Correcta.
- the BIOS
- Question 19
- 3.225 out of 3.225 points
- What command can be used to take full access of a file?
- Correct Answer:
- Correcta.
- icacls
- Question 20
- 3.225 out of 3.225 points
- What technology can be used to locate a device such as a laptop after it has been stolen?
- Correct Answer:
- Correcta.
- LoJack
- Question 21
- 3.225 out of 3.225 points
- Using Group Policy, you can set security policies to help secure a workstation.
- Correct Answer:
- Correct True
- Question 22
- 3.225 out of 3.225 points
- What keystroke should you press to get a logon window if you don't use the welcome screen?
- Correct Answer:
- Correctb.
- Ctrl+Alt+Delete
- Question 23
- 3.225 out of 3.225 points
- Match each item with a statement below.
- Question Correct Match
- software installed on a computer that produces pop-up ads using your browser
- Correct a.
- adware
- a code used to identify and authenticate a person or organization sending data over a network
- Correct b.
- digital certificate
- A program that is potentially harmful or potentially unwanted
- Correct c.
- grayware
- type of spyware that tracks your keystrokes, including passwords
- Correct d.
- keylogger
- an attack that can be used to crack a long password by trying words and word combinations
- Correct e.
- dictionary attack
- the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
- Correct f.
- social engineering
- when someone who is unauthorized follows the employee through a secured entrance to a room or building
- Correct g.
- tailgating
- A type of malware that tricks you into opening it by substituting itself for a legitimate program
- Correct h.
- Trojan
- a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
- Correct i.
- zombie
- an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
- Correct j.
- worm
- Question 24
- 3.225 out of 3.225 points
- When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?
- Correct Answer:
- Correctc.
- man-in-the-middle
- Question 25
- 3.225 out of 3.225 points
- What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.)
- Correct Answers:
- Correcta.
- press Windows key + L
- Correctd.
- press Ctrl+Alt+Delete and click Lock this Computer
- Question 26
- 3.225 out of 3.225 points
- Using a PIN or password in addition to TPM is an example of what type of authentication?
- Correct Answer:
- Correcta.
- multifactor
- Question 27
- 3.225 out of 3.225 points
- When using the Windows Encrypted File System, what statement is accurate?
- Correct Answer:
- Correctd.
- an encrypted file moved to an unencrypted folder remains encrypted
- Question 28
- 3.225 out of 3.225 points
- A root certificate is the original certificate issued by the CA.
- Correct Answer:
- Correct True
- Question 29
- 3.225 out of 3.225 points
- Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?
- Correct Answer:
- Correctd.
- malware signatures
- Question 30
- 3.225 out of 3.225 points
- What are some of the ways you can use BitLocker Encryption? (Choose all that apply.)
- Correct Answers:
- Correcta.
- computer and user authentication using a PIN and TPM
- Correctb.
- user authentication using a USB flash drive
- Correctc.
- computer authentication using TPM
- Question 31
- 3.225 out of 3.225 points
- If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
- Correct Answer:
- Correctd.
- a TPM chip on the motherboard
- Monday, December 5, 2016 8:52:38 PM CST
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement