A+ Essentials Chapter 23

9 Questions | Attempts: 278
Share
Please wait...
Question 1 / 9
0 %
0/100
Score 0/100
1. Which of the following should Mary set up on her Wi-Fi router to make it the
most secure?

Explanation

Mary should set up WPA2 on her Wi-Fi router.

Submit
Please wait...
About This Quiz
A Plus Essential Quizzes & Trivia

Computer Security

In this chapter, you will learn how to

• Explain the threats to your computers and data
• Describe how to control the local computing environment
• Explain how to protect computers from network threats

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Zander downloaded a game off the Internet and installed it, but as soon as he
started to play he got a blue screen of death. Upon rebooting, he discovered
that his My Documents folder had been erased. What happened?

Explanation

Zander clearly installed a Trojan, a virus masquerading as a game.

Submit
3. What is the process of using or manipulating people to gain access to network
resources?

Explanation

Social engineering is the process of using or manipulating people to gain
access to network resources.

Submit
4. Johan migrated his server data to a bigger, faster hard drive. At the end of the
process, he partitioned and formatted the older hard drive before removing it
to donate to charity. How secure is his company’s data?

Explanation

Although it would take a little work, simple software tools can recover a lot
of data, even after partitioning and formatting.

Submit
5. Randall needs to change the file system on his second hard drive (currently
the D: drive) from FAT32 to NTFS. Which of the following commands would
do the trick?

Explanation

Use the following command to convert from FAT32 to NTFS:
CONVERT D: /FS:NTFS

Submit
6. What tool would you use to enable auditing on a local level?

Explanation

You can enable local auditing through Local Security Settings.

Submit
7. Which type of encryption offers the most security?

Explanation

Of the choices here, MS-CHAP offers the most security.

Submit
8. Which of the following would you select if you need to back up an Active
Directory server?

Explanation

Backing up the system state data gets the Registry, Active Directory files, and
more.

Submit
9. Which of the following tools would enable you to stop a user from logging on
to a local machine, but still enable him to log on to the domain?

Explanation

Local Security Settings enable you stop someone from logging on to a local
machine.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 23, 2008
    Quiz Created by
    Darren McMahon
Cancel
  • All
    All (9)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following should Mary set up on her Wi-Fi router to make...
Zander downloaded a game off the Internet and installed it, but as...
What is the process of using or manipulating people to gain access to...
Johan migrated his server data to a bigger, faster hard drive. At the...
Randall needs to change the file system on his second hard drive...
What tool would you use to enable auditing on a local level?
Which type of encryption offers the most security?
Which of the following would you select if you need to back up an...
Which of the following tools would enable you to stop a user from...
Alert!

Advertisement