|
1 | | What is it called when a user accesses resources in an unauthorized way? |
| | A) | authorized access |
| | B) | normal |
| | C) | unauthorized access |
| | D) | virus attack |
|
|
|
2 | | What should be backed up to protect the Registry and security settings? |
| | A) | ASR |
| | B) | administrative tools |
| | C) | System State data |
| | D) | virtual state data |
|
|
|
3 | | What should be backed up to protect the Registry and security settings? |
| | A) | ASR |
| | B) | administrative tools |
| | C) | System State data |
| | D) | virtual state data |
|
|
|
4 | | What is it called when you move data from one PC to a newer PC? |
| | A) | a good day |
| | B) | migration |
| | C) | retiring |
| | D) | FAST |
|
|
|
5 | | You format a hard drive that had sensitive data on it. What will be left on the hard drive? |
| | A) | remnants |
| | B) | secret data |
| | C) | nothing recoverable |
| | D) | confidential data |
|
|
|
6 | | What is the process of using or manipulating people inside the networking environment to gain access to that network from the outside? |
| | A) | internal virus |
| | B) | inside attack |
| | C) | hacking |
| | D) | social engineering |
|
|
|
7 | | What is it called when a hacker goes through the garbage looking for information? |
| | A) | dumpster diving |
| | B) | infiltration |
| | C) | garbage scan |
| | D) | wastebasket diving |
|
|
|
8 | | Physical security, authentication, the file system, users and groups, and security policies combine to make what? |
| | A) | access control |
| | B) | authentication |
| | C) | encryption |
| | D) | secure servers |
|
|
|
9 | | How does a computer determine who can or should access it? |
| | A) | access control |
| | B) | authentication |
| | C) | encryption |
| | D) | secure servers |
|
|
|
10 | | A user has a credit card–sized card used to prove her identity with a PIN. What is this card called? |
| | A) | authorization card |
| | B) | biometric card |
| | C) | smart card |
| | D) | task card |
|
|
|
11 | | What command would you use to change a FAT32 partition into an NTFS partition? |
| | A) | CHANGE |
| | B) | CONVERT |
| | C) | NTFSUP |
| | D) | FAT32TONTFS |
|
|
|
12 | | What could a computer use to determine a user’s identity with the most authority? |
| | A) | biometric device |
| | B) | password |
| | C) | user name |
| | D) | keyboard |
|
|
|
13 | | Sally is a member of multiple groups. A file has been granted different permissions to the different groups. What is Sally’s effective permission? |
| | A) | combined permissions of all groups |
| | B) | Full Control |
| | C) | most restrictive permissions of all groups |
| | D) | impossible to say |
|
|
|
14 | | To lock down security settings on a single computer in a workgroup, what would you use? |
| | A) | Group Policy |
| | B) | Local Security Settings |
| | C) | Account Lockout Policy |
| | D) | Password Policy |
|
|
|
15 | | To lock down security settings on a single computer in a domain, what would you use? |
| | A) | Group Policy |
| | B) | Local Security Settings |
| | C) | Account Lockout Policy |
| | D) | Password Policy |
|
|
|
16 | | What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program? |
| | A) | spyware |
| | B) | Trojan |
| | C) | virus |
| | D) | worm |
|
|
|
17 | | What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)? |
| | A) | spyware |
| | B) | Trojan |
| | C) | virus |
| | D) | worm |
|
|
|
18 | | What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems? |
| | A) | spyware |
| | B) | Trojan |
| | C) | virus |
| | D) | worm |
|
|
|
19 | | Together, what are viruses, Trojans, and worms called? |
| | A) | grayware |
| | B) | helpful software |
| | C) | malware |
| | D) | spyware |
|
|
|
20 | | Antivirus programs can passively monitor your computer’s activity. In this mode, what are they called? |
| | A) | grayware |
| | B) | spyware |
| | C) | virus shields |
| | D) | virus swords |
|
|
|
21 | | To make sure antivirus programs are as useful as possible, what should be updated regularly? |
| | A) | browser |
| | B) | security updates |
| | C) | signatures |
| | D) | Windows updates |
|
|
|
22 | | What type of virus attempts to change its signature to prevent detection by antivirus programs? |
| | A) | grayware |
| | B) | spyware |
| | C) | polymorph |
| | D) | stealth |
|
|
|
23 | | 23. What type of program runs in the background on your PC, sending information about your browsing habits to the company that installed it on your system? |
| | A) | adware |
| | B) | grayware |
| | C) | pop-ups |
| | D) | spyware |
|
|
|
24 | | What type of program isn’t destructive by itself, but leaches bandwidth in networks? |
| | A) | adware |
| | B) | grayware |
| | C) | pop-ups |
| | D) | spyware |
|
|
|
25 | | Which authentication method sends passwords in clear text? |
| | A) | CHAP |
| | B) | Kerberos |
| | C) | MS-CHAP |
| | D) | PAP |
|
|
|
26 | | What can be used to create entries in the Security log whenever a user logs on? |
| | A) | event auditing |
| | B) | object access auditing |
| | C) | event tracking |
| | D) | success logging |
|
|