Site MapHelpFeedbackChapter 23 - Computer Security
Chapter 23 - Computer Security
(See related pages)

1
What is it called when a user accesses resources in an unauthorized way?
A)authorized access
B)normal
C)unauthorized access
D)virus attack
2
What should be backed up to protect the Registry and security settings?
A)ASR
B)administrative tools
C)System State data
D)virtual state data
3
What should be backed up to protect the Registry and security settings?
A)ASR
B)administrative tools
C)System State data
D)virtual state data
4
What is it called when you move data from one PC to a newer PC?
A)a good day
B)migration
C)retiring
D)FAST
5
You format a hard drive that had sensitive data on it. What will be left on the hard drive?
A)remnants
B)secret data
C)nothing recoverable
D)confidential data
6
What is the process of using or manipulating people inside the networking environment to gain access to that network from the outside?
A)internal virus
B)inside attack
C)hacking
D)social engineering
7
What is it called when a hacker goes through the garbage looking for information?
A)dumpster diving
B)infiltration
C)garbage scan
D)wastebasket diving
8
Physical security, authentication, the file system, users and groups, and security policies combine to make what?
A)access control
B)authentication
C)encryption
D)secure servers
9
How does a computer determine who can or should access it?
A)access control
B)authentication
C)encryption
D)secure servers
10
A user has a credit card–sized card used to prove her identity with a PIN. What is this card called?
A)authorization card
B)biometric card
C)smart card
D)task card
11
What command would you use to change a FAT32 partition into an NTFS partition?
A)CHANGE
B)CONVERT
C)NTFSUP
D)FAT32TONTFS
12
What could a computer use to determine a user’s identity with the most authority?
A)biometric device
B)password
C)user name
D)keyboard
13
Sally is a member of multiple groups. A file has been granted different permissions to the different groups. What is Sally’s effective permission?
A)combined permissions of all groups
B)Full Control
C)most restrictive permissions of all groups
D)impossible to say
14
To lock down security settings on a single computer in a workgroup, what would you use?
A)Group Policy
B)Local Security Settings
C)Account Lockout Policy
D)Password Policy
15
To lock down security settings on a single computer in a domain, what would you use?
A)Group Policy
B)Local Security Settings
C)Account Lockout Policy
D)Password Policy
16
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?
A)spyware
B)Trojan
C)virus
D)worm
17
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?
A)spyware
B)Trojan
C)virus
D)worm
18
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?
A)spyware
B)Trojan
C)virus
D)worm
19
Together, what are viruses, Trojans, and worms called?
A)grayware
B)helpful software
C)malware
D)spyware
20
Antivirus programs can passively monitor your computer’s activity. In this mode, what are they called?
A)grayware
B)spyware
C)virus shields
D)virus swords
21
To make sure antivirus programs are as useful as possible, what should be updated regularly?
A)browser
B)security updates
C)signatures
D)Windows updates
22
What type of virus attempts to change its signature to prevent detection by antivirus programs?
A)grayware
B)spyware
C)polymorph
D)stealth
23
23. What type of program runs in the background on your PC, sending information about your browsing habits to the company that installed it on your system?
A)adware
B)grayware
C)pop-ups
D)spyware
24
What type of program isn’t destructive by itself, but leaches bandwidth in networks?
A)adware
B)grayware
C)pop-ups
D)spyware
25
Which authentication method sends passwords in clear text?
A)CHAP
B)Kerberos
C)MS-CHAP
D)PAP
26
What can be used to create entries in the Security log whenever a user logs on?
A)event auditing
B)object access auditing
C)event tracking
D)success logging







Mike Meyer's A + SeriesOnline Learning Center

Home > Chapter 23 > Multiple Choice Quiz