Upload
meachamrob
View
123
Download
3
Embed Size (px)
DESCRIPTION
CompTIA A+ Aplus Certification. Quizzes
Citation preview
A+ Review Quizzes Ch19
Question 1
Correct
Mark 9 out of 9
Flag question
Question text
Match the Best Answer
Proves that an individual is who he says he is and is accomplished by a variety of techniques
Authentication
Determines what an individual can do in the system Authorization
Junk e-mail that you don’t want, you didn’t ask for, and that gets in your way Spam
A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself.
Phishing
Dormant code added to software and triggered at a predetermined time or by a predetermined event
Logic bomb
Substitutes itself for a legitimate program Trojan horse
Hides in an executable program having an .exe, .com, .sys, .vbs, or other executable file extension, or in a word-processing document that contains a macro
File virus
The most common viruses spread by e-mail Macro viruses
Malware that loads itself before the OS boot is complete Rootkit
Feedback
The correct answer is: Proves that an individual is who he says he is and is accomplished by a variety of techniques – Authentication, Determines what an individual can do in the system – Authorization, Junk e-mail that you don’t want, you didn’t ask for, and that gets in your way – Spam, A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself. – Phishing, Dormant code added to software and triggered at a predetermined time or by a predetermined event – Logic bomb, Substitutes itself for a legitimate program – Trojan horse, Hides in an executable program having an
.exe, .com, .sys, .vbs, or other executable file extension, or in a word-processing document that contains a macro – File virus, The most common viruses spread by e-mail – Macro viruses, Malware that loads itself before the OS boot is complete – Rootkit.
Question 2
Correct
Mark 1 out of 1
Flag question
Question text
The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.
Select one:
a. BS 7799 and ISO 17799
b. ISO 17799 and ISO 27002
c. ISO 17799 and ISO 27001
d. ISO 27001 and ISO 7799
Feedback
The correct answer is: ISO 17799 and ISO 27002.
Question 3
Correct
Mark 1 out of 1
Flag question
Question text
For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals.
Select one:
a. GLB
b. NIST
c. SOX
d. HIPAA
Feedback
The correct answer is: HIPAA.
Question 4
Correct
Mark 1 out of 1
Flag question
Question text
When implementing a security plan, the four steps are sometimes called the ____.
Select one:
a. Plan-Build-Run-Act
b. Plan-Build-Review-Act
c. Plan-Do-Study-Act
d. Plan-Study-Act-Review
Feedback
The correct answer is: Plan-Do-Study-Act.
Question 5
Correct
Mark 1 out of 1
Flag question
Question text
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.
Select one:
a. reset
b. recovery
c. vault
d. conversion
Feedback
The correct answer is: reset.
Question 6
Correct
Mark 1 out of 1
Flag question
Question text
A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.
Select one:
a. password
b. token
c. digital certificate
d. credential
Feedback
The correct answer is: digital certificate.
Question 7
Correct
Mark 1 out of 1
Flag question
Question text
A ____ is made of several words with spaces allowed.
Select one:
a. password
b. passphrase
c. token
d. credential
Feedback
The correct answer is: passphrase.
Question 8
Correct
Mark 1 out of 1
Flag question
Question text
A ____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
Select one:
a. weak
b. usable
c. unbreakable
d. strong
Feedback
The correct answer is: strong.
Question 9
Correct
Mark 1 out of 1
Flag question
Question text
A ____ account has complete access to the system and can make changes that affect the security of the system and other users.
Select one:
a. service
b. administrator
c. privileged
d. user
Feedback
The correct answer is: administrator.
Question 10
Correct
Mark 1 out of 1
Flag question
Question text
A ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data.
Select one:
a. user
b. administrator
c. limited
d. privileged
Feedback
The correct answer is: limited.
Question 11
Correct
Mark 1 out of 1
Flag question
Question text
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
Select one:
a. permissions
b. controls
c. authentication
d. sensitivity
Feedback
The correct answer is: permissions.
Question 12
Correct
Mark 1 out of 1
Flag question
Question text
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
Select one:
a. access
b. interface
c. drive
d. control
Feedback
The correct answer is: drive.
Question 13
Correct
Mark 1 out of 1
Flag question
Question text
Most encryption software products use a method called ____.
Select one:
a. Private Key Encryption
b. Symmetric Key Encryption
c. Shared Secret Encryption
d. Public Key Encryption
Feedback
The correct answer is: Public Key Encryption.
Question 14
Correct
Mark 1 out of 1
Flag question
Question text
____ is any annoying and unwanted program that might or might not mean you harm.
Select one:
a. Malware
b. Grayware
c. Testware
d. Adware
Feedback
The correct answer is: Grayware.
Question 15
Correct
Mark 1 out of 1
Flag question
Question text
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
Select one:
a. backdoor
b. release
c. helper
d. beneficial routine
Feedback
The correct answer is: backdoor.
Question 16
Correct
Mark 1 out of 1
Flag question
Question text
A ____ virus can hide in either of two boot areas of a hard drive.
Select one:
a. partition
b. Trojan
c. polymorphic
d. boot sector
Feedback
The correct answer is: boot sector.
Question 17
Correct
Mark 1 out of 1
Flag question
Question text
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
Select one:
a. polymorphic
b. boot sector
c. multipartite
d. macro
Feedback
The correct answer is: multipartite.
Question 18
Correct
Mark 1 out of 1
Flag question
Question text
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
Select one:
a. multipartite
b. macro
c. polymorphic
d. boot sector
Feedback
The correct answer is: macro.
Question 19
Correct
Mark 1 out of 1
Flag question
Question text
As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current.
Select one:
a. virus
b. antivirus
c. spyware
d. Trojan
Feedback
The correct answer is: antivirus.
Question 20
Correct
Mark 1 out of 1
Flag question
Question text
Generally speaking, the weakest link in setting up security in a computer environment is ____.
Select one:
a. the network
b. the operating system
c. people
d. the hardware
Feedback
The correct answer is: people.
Question 21
Correct
Mark 1 out of 1
Flag question
Question text
In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
Select one:
a. social engineering
b. social hacking
c. hacktivism
d. social motivation
Feedback
The correct answer is: social engineering.
Question 22
Correct
Mark 1 out of 1
Flag question
Question text
Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive.
Select one:
a. partition utility
b. diagnostic utility
c. cloning utility
d. zero-fill utility
Feedback
The correct answer is: zero-fill utility.
Question 23
Correct
Mark 1 out of 1
Flag question
Question text
Individuals are always free to decide what security measures they want to use.
Select one:
True
False
Feedback
The correct answer is 'False'.
Question 24
Correct
Mark 1 out of 1
Flag question
Question text
It’s best to use three-factor authentication.
Select one:
True
False
Feedback
The correct answer is 'False'.
Question 25
Correct
Mark 1 out of 1
Flag question
Question text
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level.
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 26
Correct
Mark 1 out of 1
Flag question
Question text
Don’t use the same password on more than one system (computer, network, or application).
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 27
Correct
Mark 1 out of 1
Flag question
Question text
When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day.
Select one:
True
False
Feedback
The correct answer is 'False'.