Chapter 18 A+ Applications

16 October 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
A person that secretly peaks at your monitor screen while you work may be doing what?
answer
shoulder surfing
question
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?
answer
malware signatures
question
CryptoLocker is an example of what type of malware?
answer
ransomware
question
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term?
answer
chain of custody
question
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
answer
the BIOS
question
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
answer
a TPM chip on the motherboard
question
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
answer
smart card
question
Using a PIN or password in addition to TPM is an example of what type of authentication?
answer
multifactor
question
What command can be used to take full access of a file?
answer
icacls
question
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
answer
degausser
question
What does the presence of the Cydia app on an iOS device indicate?
answer
The device has been jailbroken
question
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?
answer
copyright
question
What keystroke should you press to get a logon window if you don't use the welcome screen?
answer
Ctrl+Alt+Delete
question
What keystroke should you press to get a logon window if you don't use the welcome screen?
answer
it is disabled by default
question
What statement regarding passwords on Windows is accurate?
answer
by default, accounts with a blank password cannot logon remotely
question
What technology can be used to locate a device such as a laptop after it has been stolen?
answer
LoJack
question
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
answer
rootkit
question
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?
answer
man-in-the-middle
question
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
answer
an encrypted file moved to an unencrypted folder remains encrypted
question
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
answer
tailgating