Chapter 18 - Hardware Support A+

9 September 2022
4.7 (114 reviews)
30 test answers

Unlock all answers in this set

Unlock answers (26)
question
On a peer-to-peer network, authentication is the responsibility of the domain. True or False
answer
False
question
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. True or False
answer
True
question
After initially installing Windows 7, you need to disable the Guest account so nobody can use it. True or False
answer
False
question
Using Group Policy, you can set security policies to help secure a workstation. True or False
answer
True
question
A root certificate is the original certificate issued by the CA. True or False
answer
True
question
What keystroke should you press to get a logon window if you don't use the welcome screen? Alt+F1 Ctrl+Ins+Home Alt+F5+End Ctrl+Alt+Delete
answer
Ctrl+Alt+Delete
question
What statement is true regarding the Guest account in Windows 7? -it is disabled by default -it automatically has a complex password -you cannot rename it -it has administrative access
answer
it is disabled by default
question
What statement regarding passwords on Windows is accurate? -it's best to write your password down so you don't get locked out of your computer -passwords cannot be longer than 14 characters -by default, accounts with a blank password cannot logon remotely -letters and numbers are allowed, but no symbols such as '@' or '!'
answer
by default, accounts with a blank password cannot logon remotely
question
When using the Windows Encrypted File System, what statement is accurate? -files can be marked for encryption, but not folders -an encrypted file moved to an unencrypted folder remains encrypted -EFS only works on NTFS and FAT32 -you need to download special software to use EFS
answer
an encrypted file moved to an unencrypted folder remains encrypted
question
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? -a USB port -an authentication key on the hard drive -a TPM chip on the motherboard -a PIN on the BIOS
answer
a TPM chip on the motherboard
question
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? -Windows POP technology -the BIOS -a feature available on some DVD drive -your USB keyboard
answer
the BIOS
question
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? retinal scanner LoJack token smart card TPM
answer
smart card
question
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive? ATA Secure Erase low-level format degausser magnetic data filter
answer
degausser
question
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? shoulder surfing tailgating social engineering session hijacking
answer
tailgating
question
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? Trojan horse rootkit adware worm
answer
rootkit
question
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? rootkit zombie brute-force man-in-the-middle
answer
man-in-the-middle
question
What technology can be used to locate a device such as a laptop after it has been stolen? Management software LoJack Trojan Multifactor Trace software
answer
LoJack
question
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild? rootkits malware signatures static updates Windows updates
answer
malware signatures
question
What does the presence of the Cydia app on an iOS device indicate? a rootkit has been installed on the device the device is infected with a worm the device has been jailbroken there is spyware software installed on the device
answer
the device has been jailbroken
question
What command can be used to take full access of a file? takeown attrib perms icacls
answer
icacls
question
Using a PIN or password in addition to TPM is an example of what type of authentication? multifactor biometric asymmetric symmetric
answer
multifactor
question
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software? copyright license user agreement cease and desist order
answer
copyright
question
CryptoLocker is an example of what type of malware? zero-day attack worm ransomware man-in-the-middle
answer
ransomware
question
A person that secretly peaks at your monitor screen while you work may be doing what? tailgating screen capping shoulder surfing social engineering
answer
shoulder surfing
question
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? evidence security roster chain of custody item inventory evidence tracking list
answer
chain of custody
question
What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.) -press Ctrl+End and click Logon Screen -press Windows key + L -press Ctrl+Alt+Delete and click Lock this Computer -press F1 and click Sleep
answer
press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer
question
What are some of the ways you can use BitLocker Encryption? (Choose all that apply.) -computer authentication using TPM -user authentication using a certificate -user authentication using a USB flash drive -computer and user authentication using a PIN and TPM
answer
computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM
question
What inputs would be considered to be part of a biometric device? (Choose all that apply.) keystrokes retina fingerprint voice
answer
retina fingerprint voice
question
What software program is an example of password management software? (Choose all that apply.) KeePass LastPass Dashlane PassLock
answer
KeePass LastPass Dashlane
question
When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.) -the password should be at least eight characters long -you should not use adjacent keys on the keyboard, such as asdf -you should combine uppercase and lower case letters, numbers, and symbols -you can use words from a foreign language to make the password more secure
answer
the password should be at least eight characters long you should not use adjacent keys on the keyboard, such as asdf you should combine uppercase and lower case letters, numbers, and symbols