15
A+ Review Quizzes Ch20 Question 1 Correct Mark 9 out of 9 Flag question Question text Match the Best Answer Includes all user accounts that can access the system except the Guest account Authenticated Users group Includes the Authenticated Users group as well as the Guest account Everyone group Those users who have not been authenticated on a remote computer Anonymous users Permissions that are attained from a parent object Inherited permissions Is when permissions are passed from parent to child Permission propagation Folders on a computer that are shared with others on the network using a folder’s Properties box Local shares Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system Drive lock passw ord Designed to do varying degrees of damage to data and software, although it does not damage PC hardware Malicious softw are A program that uses unusually complex methods to hide itself on a system, and Rootkit

A+ Review Quizzes Ch20

Embed Size (px)

DESCRIPTION

CompTIA A+ Aplus Certification. Quizzes

Citation preview

Page 1: A+ Review Quizzes Ch20

A+ Review Quizzes Ch20

Question 1

Correct

Mark 9 out of 9

Flag question

Question text

Match the Best Answer

Includes all user accounts that can access the system except the Guest account Authenticated Users group

Includes the Authenticated Users group as well as the Guest account Everyone group

Those users who have not been authenticated on a remote computer Anonymous users

Permissions that are attained from a parent object Inherited permissions

Is when permissions are passed from parent to child Permission propagation

Folders on a computer that are shared with others on the network using a folder’s Properties box

Local shares

Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system

Drive lock passw ord

Designed to do varying degrees of damage to data and software, although it does not damage PC hardware

Malicious softw are

A program that uses unusually complex methods to hide itself on a system, and Rootkit

Page 2: A+ Review Quizzes Ch20

many spyware and adware programs are also rootkits

Feedback

The correct answer is: Includes all user accounts that can access the system except the Guest account – Authenticated Users group, Includes the Authenticated Users group as well as the Guest account – Everyone group, Those users who have not been authenticated on a remote computer – Anonymous users, Permissions that are attained from a parent object – Inherited permissions, Is when permissions are passed from parent to child – Permission propagation, Folders on a computer that are shared with others on the network using a folder’s Properties box – Local shares, Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system – Drive lock password, Designed to do varying degrees of damage to data and software, although it does not damage PC hardware – Malicious software, A program that uses unusually complex methods to hide itself on a system, and many spyware and adware programs are also rootkits – Rootkit.

Question 2

Correct

Mark 1 out of 1

Flag question

Question text

Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file.

Select one:

a. network

b. simple

c. directory

d. user

Feedback

The correct answer is: simple.

Question 3

Correct

Mark 1 out of 1

Page 3: A+ Review Quizzes Ch20

Flag question

Question text

When you share folders on the network, the ____ permissions for remote users need to be set.

Select one:

a. share

b. file

c. folder

d. disc

Feedback

The correct answer is: share.

Question 4

Correct

Mark 1 out of 1

Flag question

Question text

The best way to change inherited permissions is to change the permissions of the ____.

Select one:

a. child object

b. inherited objects

c. parent object

d. inheriting objects

Feedback

The correct answer is: parent object.

Question 5

Correct

Page 4: A+ Review Quizzes Ch20

Mark 1 out of 1

Flag question

Question text

To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.

Select one:

a. Security

b. Derived Permissions

c. Actual Permissions

d. Effective Permissions

Feedback

The correct answer is: Effective Permissions.

Question 6

Correct

Mark 1 out of 1

Flag question

Question text

A $ at the end of the folder name creates a ____ share.

Select one:

a. public

b. hidden

c. inaccessible

d. visible

Feedback

The correct answer is: hidden.

Page 5: A+ Review Quizzes Ch20

Question 7

Correct

Mark 1 out of 1

Flag question

Question text

If you name a shared folder Financial$, in order to access the folder, a user must enter ____ in the Vista Start Search box.

Select one:

a. \\computername\Financial$

b. \\financial$\computername

c. \\computername\shares\financial$

d. \\shares\computername\financial$

Feedback

The correct answer is: \\computername\Financial$.

Question 8

Correct

Mark 1 out of 1

Flag question

Question text

The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost.

Select one:

a. Decipher

b. Cipher

c. Decode

d. Transcode

Page 6: A+ Review Quizzes Ch20

Feedback

The correct answer is: Cipher.

Question 9

Correct

Mark 1 out of 1

Flag question

Question text

For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a ____ digital certificate to be used for the encryption.

Select one:

a. publicly-signed

b. network-signed

c. system-signed

d. self-signed

Feedback

The correct answer is: self-signed.

Question 10

Correct

Mark 1 out of 1

Flag question

Question text

Certificates are managed using the ____ console.

Select one:

a. Certificate Store

b. Certificate Preparation

Page 7: A+ Review Quizzes Ch20

c. Certificate Manager

d. Digital Certificate

Feedback

The correct answer is: Certificate Manager.

Question 11

Correct

Mark 1 out of 1

Flag question

Question text

If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a ____ certificate.

Select one:

a. recovery

b. restoration

c. backup

d. administrator

Feedback

The correct answer is: recovery.

Question 12

Correct

Mark 1 out of 1

Flag question

Question text

Many notebook computers have a chip on the motherboard called the ____.

Select one:

Page 8: A+ Review Quizzes Ch20

a. MPM

b. CPM

c. UPM

d. TPM

Feedback

The correct answer is: TPM.

Question 13

Correct

Mark 1 out of 1

Flag question

Question text

____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip.

Select one:

a. Software

b. BIOS

c. Blocks

d. Chipsets

Feedback

The correct answer is: BIOS.

Question 14

Correct

Mark 1 out of 1

Flag question

Question text

Page 9: A+ Review Quizzes Ch20

A ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources.

Select one:

a. unrestricted

b. restricted

c. isolated

d. quarantined

Feedback

The correct answer is: quarantined.

Question 15

Correct

Mark 1 out of 1

Flag question

Question text

AV software detects a known virus by looking for distinguishing characteristics called ____ signatures.

Select one:

a. behavior

b. process

c. virus

d. malicious

Feedback

The correct answer is: virus.

Question 16

Correct

Mark 1 out of 1

Page 10: A+ Review Quizzes Ch20

Flag question

Question text

If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.

Select one:

a. HKLM\System\CurrentControlSet\Control\SafeBoot

b. HKLM\System\CurrentControlSet\System\SafeBoot

c. HKCU\System\CurrentControlSet\Control\SafeBoot

d. HKLM\System\CurrentControlSet\Services\SafeBoot

Feedback

The correct answer is: HKLM\System\CurrentControlSet\Control\SafeBoot.

Question 17

Correct

Mark 1 out of 1

Flag question

Question text

You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or ____.

Select one:

a. Administrator

b. Guest

c. Local

d. Network Service

Feedback

The correct answer is: Network Service.

Question 18

Page 11: A+ Review Quizzes Ch20

Correct

Mark 1 out of 1

Flag question

Question text

Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software.

Select one:

a. Computer Manager

b. Task Manager

c. System Manager

d. Event Viewer

Feedback

The correct answer is: Task Manager.

Question 19

Correct

Mark 1 out of 1

Flag question

Question text

To see a list of services managed by Svchost, enter this command in a command-prompt window: ____.

Select one:

a. taskview /svc

b. taskmgr /svc

c. tasklist /SVC

d. tasklist /all

Page 12: A+ Review Quizzes Ch20

Feedback

The correct answer is: tasklist /SVC.

Question 20

Correct

Mark 1 out of 1

Flag question

Question text

The term ____ applies to a kit or set of tools used originally on UNIX computers.

Select one:

a. rootkit

b. botkit

c. stealthkit

d. worm

Feedback

The correct answer is: rootkit.

Question 21

Correct

Mark 1 out of 1

Flag question

Question text

In UNIX, the lowest and most powerful level of UNIX accounts is called the ____ account.

Select one:

a. God

b. master

c. universal

Page 13: A+ Review Quizzes Ch20

d. root

Feedback

The correct answer is: root.

Question 22

Correct

Mark 1 out of 1

Flag question

Question text

A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.

Select one:

a. root

b. privileged

c. user

d. executive

Feedback

The correct answer is: user.

Question 23

Correct

Mark 1 out of 1

Flag question

Question text

When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups.

Select one:

True

Page 14: A+ Review Quizzes Ch20

False

Feedback

The correct answer is 'True'.

Question 24

Correct

Mark 1 out of 1

Flag question

Question text

Allowing users full control of a folder is always required by job requirements.

Select one:

True

False

Feedback

The correct answer is 'False'.

Question 25

Correct

Mark 1 out of 1

Flag question

Question text

Permissions manually set for a subfolder or file cannot override inherited permissions.

Select one:

True

False

Feedback

The correct answer is 'False'.

Page 15: A+ Review Quizzes Ch20

Question 26

Correct

Mark 1 out of 1

Flag question

Question text

It is necessary that all computers belong to the same workgroup in order to share resources.

Select one:

True

False

Feedback

The correct answer is 'False'.

Question 27

Correct

Mark 1 out of 1

Flag question

Question text

If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.

Select one:

True

False

Feedback

The correct answer is 'True'.