13
A+ Review Quizzes Ch19 Question 1 Correct Mark 9 out of 9 Flag question Question text Match the Best Answer Proves that an individual is who he says he is and is accomplished by a variety of techniques Authentication Determines what an individual can do in the system Authorization Junk e-mail that you don’t want, you didn’t ask for, and that gets in your way Spam A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself. Phishing Dormant code added to software and triggered at a predetermined time or by a predetermined event Logic bomb Substitutes itself for a legitimate program Trojan horse Hides in an executable program having an .exe, .com, .sys, .vbs, or other executable file extension, or in a word-processing document that contains a macro File virus The most common viruses spread by e-mail Macro viruses Malware that loads itself before the OS boot is complete Rootkit Feedback The correct answer is: Proves that an individual is who he says he is and is accomplished by a variety of techniques – Authentication, Determines what an individual can do in the system – Authorization, Junk e-mail that you don’t want, you didn’t ask for, and that gets in your way – Spam, A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself. – Phishing, Dormant code added to software and triggered at a predetermined time or by a predetermined event – Logic bomb, Substitutes itself for a legitimate program – Trojan horse, Hides in an executable program having an

A+ Review Quizzes Ch19

Embed Size (px)

DESCRIPTION

CompTIA A+ Aplus Certification. Quizzes

Citation preview

Page 1: A+ Review Quizzes Ch19

A+ Review Quizzes Ch19

Question 1

Correct

Mark 9 out of 9

Flag question

Question text

Match the Best Answer

Proves that an individual is who he says he is and is accomplished by a variety of techniques

Authentication

Determines what an individual can do in the system Authorization

Junk e-mail that you don’t want, you didn’t ask for, and that gets in your way Spam

A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself.

Phishing

Dormant code added to software and triggered at a predetermined time or by a predetermined event

Logic bomb

Substitutes itself for a legitimate program Trojan horse

Hides in an executable program having an .exe, .com, .sys, .vbs, or other executable file extension, or in a word-processing document that contains a macro

File virus

The most common viruses spread by e-mail Macro viruses

Malware that loads itself before the OS boot is complete Rootkit

Feedback

The correct answer is: Proves that an individual is who he says he is and is accomplished by a variety of techniques – Authentication, Determines what an individual can do in the system – Authorization, Junk e-mail that you don’t want, you didn’t ask for, and that gets in your way – Spam, A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself. – Phishing, Dormant code added to software and triggered at a predetermined time or by a predetermined event – Logic bomb, Substitutes itself for a legitimate program – Trojan horse, Hides in an executable program having an

Page 2: A+ Review Quizzes Ch19

.exe, .com, .sys, .vbs, or other executable file extension, or in a word-processing document that contains a macro – File virus, The most common viruses spread by e-mail – Macro viruses, Malware that loads itself before the OS boot is complete – Rootkit.

Question 2

Correct

Mark 1 out of 1

Flag question

Question text

The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.

Select one:

a. BS 7799 and ISO 17799

b. ISO 17799 and ISO 27002

c. ISO 17799 and ISO 27001

d. ISO 27001 and ISO 7799

Feedback

The correct answer is: ISO 17799 and ISO 27002.

Question 3

Correct

Mark 1 out of 1

Flag question

Question text

For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals.

Select one:

a. GLB

b. NIST

c. SOX

d. HIPAA

Feedback

The correct answer is: HIPAA.

Page 3: A+ Review Quizzes Ch19

Question 4

Correct

Mark 1 out of 1

Flag question

Question text

When implementing a security plan, the four steps are sometimes called the ____.

Select one:

a. Plan-Build-Run-Act

b. Plan-Build-Review-Act

c. Plan-Do-Study-Act

d. Plan-Study-Act-Review

Feedback

The correct answer is: Plan-Do-Study-Act.

Question 5

Correct

Mark 1 out of 1

Flag question

Question text

Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.

Select one:

a. reset

b. recovery

c. vault

d. conversion

Feedback

The correct answer is: reset.

Question 6

Correct

Mark 1 out of 1

Page 4: A+ Review Quizzes Ch19

Flag question

Question text

A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.

Select one:

a. password

b. token

c. digital certificate

d. credential

Feedback

The correct answer is: digital certificate.

Question 7

Correct

Mark 1 out of 1

Flag question

Question text

A ____ is made of several words with spaces allowed.

Select one:

a. password

b. passphrase

c. token

d. credential

Feedback

The correct answer is: passphrase.

Question 8

Correct

Mark 1 out of 1

Flag question

Page 5: A+ Review Quizzes Ch19

Question text

A ____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.

Select one:

a. weak

b. usable

c. unbreakable

d. strong

Feedback

The correct answer is: strong.

Question 9

Correct

Mark 1 out of 1

Flag question

Question text

A ____ account has complete access to the system and can make changes that affect the security of the system and other users.

Select one:

a. service

b. administrator

c. privileged

d. user

Feedback

The correct answer is: administrator.

Question 10

Correct

Mark 1 out of 1

Flag question

Question text

A ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data.

Page 6: A+ Review Quizzes Ch19

Select one:

a. user

b. administrator

c. limited

d. privileged

Feedback

The correct answer is: limited.

Question 11

Correct

Mark 1 out of 1

Flag question

Question text

Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.

Select one:

a. permissions

b. controls

c. authentication

d. sensitivity

Feedback

The correct answer is: permissions.

Question 12

Correct

Mark 1 out of 1

Flag question

Question text

A network ____ map is one of the most powerful and versatile methods of communicating over a network.

Select one:

a. access

b. interface

c. drive

Page 7: A+ Review Quizzes Ch19

d. control

Feedback

The correct answer is: drive.

Question 13

Correct

Mark 1 out of 1

Flag question

Question text

Most encryption software products use a method called ____.

Select one:

a. Private Key Encryption

b. Symmetric Key Encryption

c. Shared Secret Encryption

d. Public Key Encryption

Feedback

The correct answer is: Public Key Encryption.

Question 14

Correct

Mark 1 out of 1

Flag question

Question text

____ is any annoying and unwanted program that might or might not mean you harm.

Select one:

a. Malware

b. Grayware

c. Testware

d. Adware

Feedback

The correct answer is: Grayware.

Question 15

Page 8: A+ Review Quizzes Ch19

Correct

Mark 1 out of 1

Flag question

Question text

A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.

Select one:

a. backdoor

b. release

c. helper

d. beneficial routine

Feedback

The correct answer is: backdoor.

Question 16

Correct

Mark 1 out of 1

Flag question

Question text

A ____ virus can hide in either of two boot areas of a hard drive.

Select one:

a. partition

b. Trojan

c. polymorphic

d. boot sector

Feedback

The correct answer is: boot sector.

Question 17

Correct

Mark 1 out of 1

Page 9: A+ Review Quizzes Ch19

Flag question

Question text

A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.

Select one:

a. polymorphic

b. boot sector

c. multipartite

d. macro

Feedback

The correct answer is: multipartite.

Question 18

Correct

Mark 1 out of 1

Flag question

Question text

A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.

Select one:

a. multipartite

b. macro

c. polymorphic

d. boot sector

Feedback

The correct answer is: macro.

Question 19

Correct

Mark 1 out of 1

Flag question

Page 10: A+ Review Quizzes Ch19

Question text

As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current.

Select one:

a. virus

b. antivirus

c. spyware

d. Trojan

Feedback

The correct answer is: antivirus.

Question 20

Correct

Mark 1 out of 1

Flag question

Question text

Generally speaking, the weakest link in setting up security in a computer environment is ____.

Select one:

a. the network

b. the operating system

c. people

d. the hardware

Feedback

The correct answer is: people.

Question 21

Correct

Mark 1 out of 1

Flag question

Question text

In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.

Select one:

Page 11: A+ Review Quizzes Ch19

a. social engineering

b. social hacking

c. hacktivism

d. social motivation

Feedback

The correct answer is: social engineering.

Question 22

Correct

Mark 1 out of 1

Flag question

Question text

Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive.

Select one:

a. partition utility

b. diagnostic utility

c. cloning utility

d. zero-fill utility

Feedback

The correct answer is: zero-fill utility.

Question 23

Correct

Mark 1 out of 1

Flag question

Question text

Individuals are always free to decide what security measures they want to use.

Select one:

True

False

Feedback

The correct answer is 'False'.

Page 12: A+ Review Quizzes Ch19

Question 24

Correct

Mark 1 out of 1

Flag question

Question text

It’s best to use three-factor authentication.

Select one:

True

False

Feedback

The correct answer is 'False'.

Question 25

Correct

Mark 1 out of 1

Flag question

Question text

Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level.

Select one:

True

False

Feedback

The correct answer is 'True'.

Question 26

Correct

Mark 1 out of 1

Flag question

Question text

Page 13: A+ Review Quizzes Ch19

Don’t use the same password on more than one system (computer, network, or application).

Select one:

True

False

Feedback

The correct answer is 'True'.

Question 27

Correct

Mark 1 out of 1

Flag question

Question text

When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day.

Select one:

True

False

Feedback

The correct answer is 'False'.