Advertisement
Guest User

Untitled

a guest
Dec 5th, 2016
443
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.50 KB | None | 0 0
  1. Question 1
  2. 3.225 out of 3.225 points
  3. What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?
  4. Correct Answer:
  5. Correctd.
  6. copyright
  7. Question 2
  8. 0 out of 3.225 points
  9. What software program is an example of password management software? (Choose all that apply.)
  10. Correct Answers:
  11. Correctb.
  12. Dashlane
  13. Correctc.
  14. KeePass
  15. Correctd.
  16. LastPass
  17. Question 3
  18. 3.225 out of 3.225 points
  19. A person that secretly peaks at your monitor screen while you work may be doing what?
  20. Correct Answer:
  21. Correctb.
  22. shoulder surfing
  23. Question 4
  24. 3.225 out of 3.225 points
  25. What statement regarding passwords on Windows is accurate?
  26. Correct Answer:
  27. Correctb.
  28. by default, accounts with a blank password cannot logon remotely
  29. Question 5
  30. 3.225 out of 3.225 points
  31. Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term?
  32. Correct Answer:
  33. Correcta.
  34. chain of custody
  35. Question 6
  36. 3.225 out of 3.225 points
  37. Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
  38. Correct Answer:
  39. Correct True
  40. Question 7
  41. 3.225 out of 3.225 points
  42. What inputs would be considered to be part of a biometric device? (Choose all that apply.)
  43. Correct Answers:
  44. Correcta.
  45. retina
  46. Correctb.
  47. fingerprint
  48. Correctc.
  49. voice
  50. Question 8
  51. 3.225 out of 3.225 points
  52. After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
  53. Correct Answer:
  54. Correct False
  55. Question 9
  56. 3.225 out of 3.225 points
  57. What statement is true regarding the Guest account in Windows 7?
  58. Correct Answer:
  59. Correctd.
  60. it is disabled by default
  61. Question 10
  62. 3.225 out of 3.225 points
  63. CryptoLocker is an example of what type of malware?
  64. Correct Answer:
  65. Correctd.
  66. ransomware
  67. Question 11
  68. 3.225 out of 3.225 points
  69. What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
  70. Correct Answer:
  71. Correcta.
  72. rootkit
  73. Question 12
  74. 3.225 out of 3.225 points
  75. You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
  76. Correct Answer:
  77. Correctb.
  78. tailgating
  79. Question 13
  80. 3.225 out of 3.225 points
  81. On a peer-to-peer network, authentication is the responsibility of the domain.
  82. Correct Answer:
  83. Correct False
  84. Question 14
  85. 3.225 out of 3.225 points
  86. What does the presence of the Cydia app on an iOS device indicate?
  87. Correct Answer:
  88. Correctb.
  89. The device has been jailbroken
  90. Question 15
  91. 0 out of 3.225 points
  92. When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.)
  93. Correct Answers:
  94. Correcta.
  95. You should combine uppercase and lower case letters, numbers, and symbols.
  96. Correctb.
  97. The password should be at least eight characters long.
  98. Correctd.
  99. You should not use adjacent keys on the keyboard, such as asdf.
  100. Question 16
  101. 3.225 out of 3.225 points
  102. One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
  103. Correct Answer:
  104. Correctd.
  105. smart card
  106. Question 17
  107. 3.225 out of 3.225 points
  108. What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
  109. Correct Answer:
  110. Correctb.
  111. degausser
  112. Question 18
  113. 3.225 out of 3.225 points
  114. If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
  115. Correct Answer:
  116. Correcta.
  117. the BIOS
  118. Question 19
  119. 3.225 out of 3.225 points
  120. What command can be used to take full access of a file?
  121. Correct Answer:
  122. Correcta.
  123. icacls
  124. Question 20
  125. 3.225 out of 3.225 points
  126. What technology can be used to locate a device such as a laptop after it has been stolen?
  127. Correct Answer:
  128. Correcta.
  129. LoJack
  130. Question 21
  131. 3.225 out of 3.225 points
  132. Using Group Policy, you can set security policies to help secure a workstation.
  133. Correct Answer:
  134. Correct True
  135. Question 22
  136. 3.225 out of 3.225 points
  137. What keystroke should you press to get a logon window if you don't use the welcome screen?
  138. Correct Answer:
  139. Correctb.
  140. Ctrl+Alt+Delete
  141. Question 23
  142. 3.225 out of 3.225 points
  143. Match each item with a statement below.
  144. Question Correct Match
  145. software installed on a computer that produces pop-up ads using your browser
  146. Correct a.
  147. adware
  148. a code used to identify and authenticate a person or organization sending data over a network
  149. Correct b.
  150. digital certificate
  151. A program that is potentially harmful or potentially unwanted
  152. Correct c.
  153. grayware
  154. type of spyware that tracks your keystrokes, including passwords
  155. Correct d.
  156. keylogger
  157. an attack that can be used to crack a long password by trying words and word combinations
  158. Correct e.
  159. dictionary attack
  160. the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
  161. Correct f.
  162. social engineering
  163. when someone who is unauthorized follows the employee through a secured entrance to a room or building
  164. Correct g.
  165. tailgating
  166. A type of malware that tricks you into opening it by substituting itself for a legitimate program
  167. Correct h.
  168. Trojan
  169. a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
  170. Correct i.
  171. zombie
  172. an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
  173. Correct j.
  174. worm
  175. Question 24
  176. 3.225 out of 3.225 points
  177. When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?
  178. Correct Answer:
  179. Correctc.
  180. man-in-the-middle
  181. Question 25
  182. 3.225 out of 3.225 points
  183. What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.)
  184. Correct Answers:
  185. Correcta.
  186. press Windows key + L
  187. Correctd.
  188. press Ctrl+Alt+Delete and click Lock this Computer
  189. Question 26
  190. 3.225 out of 3.225 points
  191. Using a PIN or password in addition to TPM is an example of what type of authentication?
  192. Correct Answer:
  193. Correcta.
  194. multifactor
  195. Question 27
  196. 3.225 out of 3.225 points
  197. When using the Windows Encrypted File System, what statement is accurate?
  198. Correct Answer:
  199. Correctd.
  200. an encrypted file moved to an unencrypted folder remains encrypted
  201. Question 28
  202. 3.225 out of 3.225 points
  203. A root certificate is the original certificate issued by the CA.
  204. Correct Answer:
  205. Correct True
  206. Question 29
  207. 3.225 out of 3.225 points
  208. Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?
  209. Correct Answer:
  210. Correctd.
  211. malware signatures
  212. Question 30
  213. 3.225 out of 3.225 points
  214. What are some of the ways you can use BitLocker Encryption? (Choose all that apply.)
  215. Correct Answers:
  216. Correcta.
  217. computer and user authentication using a PIN and TPM
  218. Correctb.
  219. user authentication using a USB flash drive
  220. Correctc.
  221. computer authentication using TPM
  222. Question 31
  223. 3.225 out of 3.225 points
  224. If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
  225. Correct Answer:
  226. Correctd.
  227. a TPM chip on the motherboard
  228. Monday, December 5, 2016 8:52:38 PM CST
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement