A+ Essentials Chapter 23

9 Questions | Attempts: 278
Share
SettingsSettings
Please wait...
  • 1/9 Questions

    Which of the following should Mary set up on her Wi-Fi router to make it themost secure?

    • NTFS
    • WEP
    • WPA
    • WPA2
Please wait...
About This Quiz

Computer Security

In this chapter, you will learn how to

• Explain the threats to your computers and data
• Describe how to control the local computing environment
• Explain how to protect computers from network threats

A Plus Essential Quizzes & Trivia

Quiz Preview

  • 2. 

    Zander downloaded a game off the Internet and installed it, but as soon as hestarted to play he got a blue screen of death. Upon rebooting, he discoveredthat his My Documents folder had been erased. What happened?

    • He installed spyware.

    • He installed a Trojan.

    • He broke the Group Policy.

    • He broke the Local Security Settings.

    Correct Answer
    A. He installed a Trojan.
    Explanation
    Zander clearly installed a Trojan, a virus masquerading as a game.

    Rate this question:

  • 3. 

    What is the process of using or manipulating people to gain access to networkresources?

    • Cracking

    • Hacking

    • Network engineering

    • Social engineering

    Correct Answer
    A. Social engineering
    Explanation
    Social engineering is the process of using or manipulating people to gain
    access to network resources.

    Rate this question:

  • 4. 

    Johan migrated his server data to a bigger, faster hard drive. At the end of theprocess, he partitioned and formatted the older hard drive before removing itto donate to charity. How secure is his company’s data?

    • Completely secured. The drive is blank after partitioning and formatting.

    • Mostly secured. Only super skilled professionals have the tools to recover data after partitioning and formatting.

    • Very unsecured. Simple software tools can recover a lot of data, even after partitioning and formatting.

    • Completely unsecured. The data on the drive will show up in the Recycle Bin as soon as someone installs it on a system.

    Correct Answer
    A. Very unsecured. Simple software tools can recover a lot of data, even after partitioning and formatting.
    Explanation
    Although it would take a little work, simple software tools can recover a lot
    of data, even after partitioning and formatting.

    Rate this question:

  • 5. 

    Randall needs to change the file system on his second hard drive (currentlythe D: drive) from FAT32 to NTFS. Which of the following commands woulddo the trick?

    • CONVERT D: /FS:NTFS

    • CONVERT D: NTFS

    • CONVERT /FS:NTFS D:

    • CONVERT NTFS D:

    Correct Answer
    A. CONVERT D: /FS:NTFS
    Explanation
    Use the following command to convert from FAT32 to NTFS:
    CONVERT D: /FS:NTFS

    Rate this question:

  • 6. 

    What tool would you use to enable auditing on a local level?

    • AD Policy

    • Group Policy

    • Local Security Settings

    • User Settings

    Correct Answer
    A. Local Security Settings
    Explanation
    You can enable local auditing through Local Security Settings.

    Rate this question:

  • 7. 

    Which type of encryption offers the most security?

    • MS-CHAP

    • PAP

    • POP3

    • SMTP

    Correct Answer
    A. MS-CHAP
    Explanation
    Of the choices here, MS-CHAP offers the most security.

    Rate this question:

  • 8. 

    Which of the following would you select if you need to back up an ActiveDirectory server?

    • Registry

    • System state data

    • My Computer

    • My Server

    Correct Answer
    A. System state data
    Explanation
    Backing up the system state data gets the Registry, Active Directory files, and
    more.

    Rate this question:

  • 9. 

    Which of the following tools would enable you to stop a user from logging onto a local machine, but still enable him to log on to the domain?

    • AD Policy

    • Group Policy

    • Local Security Settings

    • User Settings

    Correct Answer
    A. Local Security Settings
    Explanation
    Local Security Settings enable you stop someone from logging on to a local
    machine.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 23, 2008
    Quiz Created by
    Darren McMahon
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.