A+ Essentials Chapter 23

9 Questions | Attempts: 278
Share

SettingsSettingsSettings
A Plus Essential Quizzes & Trivia

Computer Security

In this chapter, you will learn how to

• Explain the threats to your computers and data
• Describe how to control the local computing environment
• Explain how to protect computers from network threats


Questions and Answers
  • 1. 

    Which of the following would you select if you need to back up an ActiveDirectory server?

    • A.

      Registry

    • B.

      System state data

    • C.

      My Computer

    • D.

      My Server

    Correct Answer
    B. System state data
    Explanation
    Backing up the system state data gets the Registry, Active Directory files, and
    more.

    Rate this question:

  • 2. 

    Johan migrated his server data to a bigger, faster hard drive. At the end of theprocess, he partitioned and formatted the older hard drive before removing itto donate to charity. How secure is his company’s data?

    • A.

      Completely secured. The drive is blank after partitioning and formatting.

    • B.

      Mostly secured. Only super skilled professionals have the tools to recover data after partitioning and formatting.

    • C.

      Very unsecured. Simple software tools can recover a lot of data, even after partitioning and formatting.

    • D.

      Completely unsecured. The data on the drive will show up in the Recycle Bin as soon as someone installs it on a system.

    Correct Answer
    C. Very unsecured. Simple software tools can recover a lot of data, even after partitioning and formatting.
    Explanation
    Although it would take a little work, simple software tools can recover a lot
    of data, even after partitioning and formatting.

    Rate this question:

  • 3. 

    What is the process of using or manipulating people to gain access to networkresources?

    • A.

      Cracking

    • B.

      Hacking

    • C.

      Network engineering

    • D.

      Social engineering

    Correct Answer
    D. Social engineering
    Explanation
    Social engineering is the process of using or manipulating people to gain
    access to network resources.

    Rate this question:

  • 4. 

    Randall needs to change the file system on his second hard drive (currentlythe D: drive) from FAT32 to NTFS. Which of the following commands woulddo the trick?

    • A.

      CONVERT D: /FS:NTFS

    • B.

      CONVERT D: NTFS

    • C.

      CONVERT /FS:NTFS D:

    • D.

      CONVERT NTFS D:

    Correct Answer
    A. CONVERT D: /FS:NTFS
    Explanation
    Use the following command to convert from FAT32 to NTFS:
    CONVERT D: /FS:NTFS

    Rate this question:

  • 5. 

    Which of the following tools would enable you to stop a user from logging onto a local machine, but still enable him to log on to the domain?

    • A.

      AD Policy

    • B.

      Group Policy

    • C.

      Local Security Settings

    • D.

      User Settings

    Correct Answer
    C. Local Security Settings
    Explanation
    Local Security Settings enable you stop someone from logging on to a local
    machine.

    Rate this question:

  • 6. 

    Which type of encryption offers the most security?

    • A.

      MS-CHAP

    • B.

      PAP

    • C.

      POP3

    • D.

      SMTP

    Correct Answer
    A. MS-CHAP
    Explanation
    Of the choices here, MS-CHAP offers the most security.

    Rate this question:

  • 7. 

    Zander downloaded a game off the Internet and installed it, but as soon as hestarted to play he got a blue screen of death. Upon rebooting, he discoveredthat his My Documents folder had been erased. What happened?

    • A.

      He installed spyware.

    • B.

      He installed a Trojan.

    • C.

      He broke the Group Policy.

    • D.

      He broke the Local Security Settings.

    Correct Answer
    B. He installed a Trojan.
    Explanation
    Zander clearly installed a Trojan, a virus masquerading as a game.

    Rate this question:

  • 8. 

    Which of the following should Mary set up on her Wi-Fi router to make it themost secure?

    • A.

      NTFS

    • B.

      WEP

    • C.

      WPA

    • D.

      WPA2

    Correct Answer
    D. WPA2
    Explanation
    Mary should set up WPA2 on her Wi-Fi router.

    Rate this question:

  • 9. 

    What tool would you use to enable auditing on a local level?

    • A.

      AD Policy

    • B.

      Group Policy

    • C.

      Local Security Settings

    • D.

      User Settings

    Correct Answer
    C. Local Security Settings
    Explanation
    You can enable local auditing through Local Security Settings.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 23, 2008
    Quiz Created by
    Darren McMahon
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.