A+ Essentials Chapter 23

9 Questions | Total Attempts: 275

SettingsSettingsSettings
A Plus Essential Quizzes & Trivia

Computer SecurityIn this chapter, you will learn how to• Explain the threats to your computers and data• Describe how to control the local computing environment• Explain how to protect computers from network threats


Questions and Answers
  • 1. 
    Which of the following would you select if you need to back up an ActiveDirectory server?
    • A. 

      Registry

    • B. 

      System state data

    • C. 

      My Computer

    • D. 

      My Server

  • 2. 
    Johan migrated his server data to a bigger, faster hard drive. At the end of theprocess, he partitioned and formatted the older hard drive before removing itto donate to charity. How secure is his company’s data?
    • A. 

      Completely secured. The drive is blank after partitioning and formatting.

    • B. 

      Mostly secured. Only super skilled professionals have the tools to recover data after partitioning and formatting.

    • C. 

      Very unsecured. Simple software tools can recover a lot of data, even after partitioning and formatting.

    • D. 

      Completely unsecured. The data on the drive will show up in the Recycle Bin as soon as someone installs it on a system.

  • 3. 
    What is the process of using or manipulating people to gain access to networkresources?
    • A. 

      Cracking

    • B. 

      Hacking

    • C. 

      Network engineering

    • D. 

      Social engineering

  • 4. 
    Randall needs to change the file system on his second hard drive (currentlythe D: drive) from FAT32 to NTFS. Which of the following commands woulddo the trick?
    • A. 

      CONVERT D: /FS:NTFS

    • B. 

      CONVERT D: NTFS

    • C. 

      CONVERT /FS:NTFS D:

    • D. 

      CONVERT NTFS D:

  • 5. 
    Which of the following tools would enable you to stop a user from logging onto a local machine, but still enable him to log on to the domain?
    • A. 

      AD Policy

    • B. 

      Group Policy

    • C. 

      Local Security Settings

    • D. 

      User Settings

  • 6. 
    Which type of encryption offers the most security?
    • A. 

      MS-CHAP

    • B. 

      PAP

    • C. 

      POP3

    • D. 

      SMTP

  • 7. 
    Zander downloaded a game off the Internet and installed it, but as soon as hestarted to play he got a blue screen of death. Upon rebooting, he discoveredthat his My Documents folder had been erased. What happened?
    • A. 

      He installed spyware.

    • B. 

      He installed a Trojan.

    • C. 

      He broke the Group Policy.

    • D. 

      He broke the Local Security Settings.

  • 8. 
    Which of the following should Mary set up on her Wi-Fi router to make it themost secure?
    • A. 

      NTFS

    • B. 

      WEP

    • C. 

      WPA

    • D. 

      WPA2

  • 9. 
    What tool would you use to enable auditing on a local level?
    • A. 

      AD Policy

    • B. 

      Group Policy

    • C. 

      Local Security Settings

    • D. 

      User Settings