 |
1 |  |  What is it called when a user accesses resources in an unauthorized way? |
|  | A) | authorized access |
|  | B) | normal |
|  | C) | unauthorized access |
|  | D) | virus attack |
|
|
 |
2 |  |  What should be backed up to protect the Registry and security settings? |
|  | A) | ASR |
|  | B) | administrative tools |
|  | C) | System State data |
|  | D) | virtual state data |
|
|
 |
3 |  |  What should be backed up to protect the Registry and security settings? |
|  | A) | ASR |
|  | B) | administrative tools |
|  | C) | System State data |
|  | D) | virtual state data |
|
|
 |
4 |  |  What is it called when you move data from one PC to a newer PC? |
|  | A) | a good day |
|  | B) | migration |
|  | C) | retiring |
|  | D) | FAST |
|
|
 |
5 |  |  You format a hard drive that had sensitive data on it. What will be left on the hard drive? |
|  | A) | remnants |
|  | B) | secret data |
|  | C) | nothing recoverable |
|  | D) | confidential data |
|
|
 |
6 |  |  What is the process of using or manipulating people inside the networking environment to gain access to that network from the outside? |
|  | A) | internal virus |
|  | B) | inside attack |
|  | C) | hacking |
|  | D) | social engineering |
|
|
 |
7 |  |  What is it called when a hacker goes through the garbage looking for information? |
|  | A) | dumpster diving |
|  | B) | infiltration |
|  | C) | garbage scan |
|  | D) | wastebasket diving |
|
|
 |
8 |  |  Physical security, authentication, the file system, users and groups, and security policies combine to make what? |
|  | A) | access control |
|  | B) | authentication |
|  | C) | encryption |
|  | D) | secure servers |
|
|
 |
9 |  |  How does a computer determine who can or should access it? |
|  | A) | access control |
|  | B) | authentication |
|  | C) | encryption |
|  | D) | secure servers |
|
|
 |
10 |  |  A user has a credit card–sized card used to prove her identity with a PIN. What is this card called? |
|  | A) | authorization card |
|  | B) | biometric card |
|  | C) | smart card |
|  | D) | task card |
|
|
 |
11 |  |  What command would you use to change a FAT32 partition into an NTFS partition? |
|  | A) | CHANGE |
|  | B) | CONVERT |
|  | C) | NTFSUP |
|  | D) | FAT32TONTFS |
|
|
 |
12 |  |  What could a computer use to determine a user’s identity with the most authority? |
|  | A) | biometric device |
|  | B) | password |
|  | C) | user name |
|  | D) | keyboard |
|
|
 |
13 |  |  Sally is a member of multiple groups. A file has been granted different permissions to the different groups. What is Sally’s effective permission? |
|  | A) | combined permissions of all groups |
|  | B) | Full Control |
|  | C) | most restrictive permissions of all groups |
|  | D) | impossible to say |
|
|
 |
14 |  |  To lock down security settings on a single computer in a workgroup, what would you use? |
|  | A) | Group Policy |
|  | B) | Local Security Settings |
|  | C) | Account Lockout Policy |
|  | D) | Password Policy |
|
|
 |
15 |  |  To lock down security settings on a single computer in a domain, what would you use? |
|  | A) | Group Policy |
|  | B) | Local Security Settings |
|  | C) | Account Lockout Policy |
|  | D) | Password Policy |
|
|
 |
16 |  |  What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program? |
|  | A) | spyware |
|  | B) | Trojan |
|  | C) | virus |
|  | D) | worm |
|
|
 |
17 |  |  What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)? |
|  | A) | spyware |
|  | B) | Trojan |
|  | C) | virus |
|  | D) | worm |
|
|
 |
18 |  |  What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems? |
|  | A) | spyware |
|  | B) | Trojan |
|  | C) | virus |
|  | D) | worm |
|
|
 |
19 |  |  Together, what are viruses, Trojans, and worms called? |
|  | A) | grayware |
|  | B) | helpful software |
|  | C) | malware |
|  | D) | spyware |
|
|
 |
20 |  |  Antivirus programs can passively monitor your computer’s activity. In this mode, what are they called? |
|  | A) | grayware |
|  | B) | spyware |
|  | C) | virus shields |
|  | D) | virus swords |
|
|
 |
21 |  |  To make sure antivirus programs are as useful as possible, what should be updated regularly? |
|  | A) | browser |
|  | B) | security updates |
|  | C) | signatures |
|  | D) | Windows updates |
|
|
 |
22 |  |  What type of virus attempts to change its signature to prevent detection by antivirus programs? |
|  | A) | grayware |
|  | B) | spyware |
|  | C) | polymorph |
|  | D) | stealth |
|
|
 |
23 |  |  23. What type of program runs in the background on your PC, sending information about your browsing habits to the company that installed it on your system? |
|  | A) | adware |
|  | B) | grayware |
|  | C) | pop-ups |
|  | D) | spyware |
|
|
 |
24 |  |  What type of program isn’t destructive by itself, but leaches bandwidth in networks? |
|  | A) | adware |
|  | B) | grayware |
|  | C) | pop-ups |
|  | D) | spyware |
|
|
 |
25 |  |  Which authentication method sends passwords in clear text? |
|  | A) | CHAP |
|  | B) | Kerberos |
|  | C) | MS-CHAP |
|  | D) | PAP |
|
|
 |
26 |  |  What can be used to create entries in the Security log whenever a user logs on? |
|  | A) | event auditing |
|  | B) | object access auditing |
|  | C) | event tracking |
|  | D) | success logging |
|
|