Upload
meachamrob
View
194
Download
2
Embed Size (px)
DESCRIPTION
CompTIA A+ Aplus Certification. Quizzes
Citation preview
A+ Review Quizzes Ch20
Question 1
Correct
Mark 9 out of 9
Flag question
Question text
Match the Best Answer
Includes all user accounts that can access the system except the Guest account Authenticated Users group
Includes the Authenticated Users group as well as the Guest account Everyone group
Those users who have not been authenticated on a remote computer Anonymous users
Permissions that are attained from a parent object Inherited permissions
Is when permissions are passed from parent to child Permission propagation
Folders on a computer that are shared with others on the network using a folder’s Properties box
Local shares
Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system
Drive lock passw ord
Designed to do varying degrees of damage to data and software, although it does not damage PC hardware
Malicious softw are
A program that uses unusually complex methods to hide itself on a system, and Rootkit
many spyware and adware programs are also rootkits
Feedback
The correct answer is: Includes all user accounts that can access the system except the Guest account – Authenticated Users group, Includes the Authenticated Users group as well as the Guest account – Everyone group, Those users who have not been authenticated on a remote computer – Anonymous users, Permissions that are attained from a parent object – Inherited permissions, Is when permissions are passed from parent to child – Permission propagation, Folders on a computer that are shared with others on the network using a folder’s Properties box – Local shares, Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system – Drive lock password, Designed to do varying degrees of damage to data and software, although it does not damage PC hardware – Malicious software, A program that uses unusually complex methods to hide itself on a system, and many spyware and adware programs are also rootkits – Rootkit.
Question 2
Correct
Mark 1 out of 1
Flag question
Question text
Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file.
Select one:
a. network
b. simple
c. directory
d. user
Feedback
The correct answer is: simple.
Question 3
Correct
Mark 1 out of 1
Flag question
Question text
When you share folders on the network, the ____ permissions for remote users need to be set.
Select one:
a. share
b. file
c. folder
d. disc
Feedback
The correct answer is: share.
Question 4
Correct
Mark 1 out of 1
Flag question
Question text
The best way to change inherited permissions is to change the permissions of the ____.
Select one:
a. child object
b. inherited objects
c. parent object
d. inheriting objects
Feedback
The correct answer is: parent object.
Question 5
Correct
Mark 1 out of 1
Flag question
Question text
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.
Select one:
a. Security
b. Derived Permissions
c. Actual Permissions
d. Effective Permissions
Feedback
The correct answer is: Effective Permissions.
Question 6
Correct
Mark 1 out of 1
Flag question
Question text
A $ at the end of the folder name creates a ____ share.
Select one:
a. public
b. hidden
c. inaccessible
d. visible
Feedback
The correct answer is: hidden.
Question 7
Correct
Mark 1 out of 1
Flag question
Question text
If you name a shared folder Financial$, in order to access the folder, a user must enter ____ in the Vista Start Search box.
Select one:
a. \\computername\Financial$
b. \\financial$\computername
c. \\computername\shares\financial$
d. \\shares\computername\financial$
Feedback
The correct answer is: \\computername\Financial$.
Question 8
Correct
Mark 1 out of 1
Flag question
Question text
The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost.
Select one:
a. Decipher
b. Cipher
c. Decode
d. Transcode
Feedback
The correct answer is: Cipher.
Question 9
Correct
Mark 1 out of 1
Flag question
Question text
For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a ____ digital certificate to be used for the encryption.
Select one:
a. publicly-signed
b. network-signed
c. system-signed
d. self-signed
Feedback
The correct answer is: self-signed.
Question 10
Correct
Mark 1 out of 1
Flag question
Question text
Certificates are managed using the ____ console.
Select one:
a. Certificate Store
b. Certificate Preparation
c. Certificate Manager
d. Digital Certificate
Feedback
The correct answer is: Certificate Manager.
Question 11
Correct
Mark 1 out of 1
Flag question
Question text
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a ____ certificate.
Select one:
a. recovery
b. restoration
c. backup
d. administrator
Feedback
The correct answer is: recovery.
Question 12
Correct
Mark 1 out of 1
Flag question
Question text
Many notebook computers have a chip on the motherboard called the ____.
Select one:
a. MPM
b. CPM
c. UPM
d. TPM
Feedback
The correct answer is: TPM.
Question 13
Correct
Mark 1 out of 1
Flag question
Question text
____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip.
Select one:
a. Software
b. BIOS
c. Blocks
d. Chipsets
Feedback
The correct answer is: BIOS.
Question 14
Correct
Mark 1 out of 1
Flag question
Question text
A ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources.
Select one:
a. unrestricted
b. restricted
c. isolated
d. quarantined
Feedback
The correct answer is: quarantined.
Question 15
Correct
Mark 1 out of 1
Flag question
Question text
AV software detects a known virus by looking for distinguishing characteristics called ____ signatures.
Select one:
a. behavior
b. process
c. virus
d. malicious
Feedback
The correct answer is: virus.
Question 16
Correct
Mark 1 out of 1
Flag question
Question text
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.
Select one:
a. HKLM\System\CurrentControlSet\Control\SafeBoot
b. HKLM\System\CurrentControlSet\System\SafeBoot
c. HKCU\System\CurrentControlSet\Control\SafeBoot
d. HKLM\System\CurrentControlSet\Services\SafeBoot
Feedback
The correct answer is: HKLM\System\CurrentControlSet\Control\SafeBoot.
Question 17
Correct
Mark 1 out of 1
Flag question
Question text
You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or ____.
Select one:
a. Administrator
b. Guest
c. Local
d. Network Service
Feedback
The correct answer is: Network Service.
Question 18
Correct
Mark 1 out of 1
Flag question
Question text
Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software.
Select one:
a. Computer Manager
b. Task Manager
c. System Manager
d. Event Viewer
Feedback
The correct answer is: Task Manager.
Question 19
Correct
Mark 1 out of 1
Flag question
Question text
To see a list of services managed by Svchost, enter this command in a command-prompt window: ____.
Select one:
a. taskview /svc
b. taskmgr /svc
c. tasklist /SVC
d. tasklist /all
Feedback
The correct answer is: tasklist /SVC.
Question 20
Correct
Mark 1 out of 1
Flag question
Question text
The term ____ applies to a kit or set of tools used originally on UNIX computers.
Select one:
a. rootkit
b. botkit
c. stealthkit
d. worm
Feedback
The correct answer is: rootkit.
Question 21
Correct
Mark 1 out of 1
Flag question
Question text
In UNIX, the lowest and most powerful level of UNIX accounts is called the ____ account.
Select one:
a. God
b. master
c. universal
d. root
Feedback
The correct answer is: root.
Question 22
Correct
Mark 1 out of 1
Flag question
Question text
A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.
Select one:
a. root
b. privileged
c. user
d. executive
Feedback
The correct answer is: user.
Question 23
Correct
Mark 1 out of 1
Flag question
Question text
When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups.
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 24
Correct
Mark 1 out of 1
Flag question
Question text
Allowing users full control of a folder is always required by job requirements.
Select one:
True
False
Feedback
The correct answer is 'False'.
Question 25
Correct
Mark 1 out of 1
Flag question
Question text
Permissions manually set for a subfolder or file cannot override inherited permissions.
Select one:
True
False
Feedback
The correct answer is 'False'.
Question 26
Correct
Mark 1 out of 1
Flag question
Question text
It is necessary that all computers belong to the same workgroup in order to share resources.
Select one:
True
False
Feedback
The correct answer is 'False'.
Question 27
Correct
Mark 1 out of 1
Flag question
Question text
If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.
Select one:
True
False
Feedback
The correct answer is 'True'.