A+ Essentials Test - Domain 6.0 Security

41 Questions | Total Attempts: 141

SettingsSettingsSettings
A Plus Essential Quizzes & Trivia

Tests for basic knowledge of the Security Domain 6. 0 portion of A+ Essentials.


Questions and Answers
  • 1. 
    What technology is also known as a hardware token?
    • A. 

      Key card

    • B. 

      RFID

    • C. 

      Hardware fob

    • D. 

      Security token

  • 2. 
    A fingerprint scanner is what type of device?
    • A. 

      USS

    • B. 

      Hardware token

    • C. 

      Biometric

    • D. 

      Key fob

  • 3. 
    What keystrokes are used to lock a Windows XP computer?
    • A. 

      F1

    • B. 

      CTRL+ALT+ESC

    • C. 

      CTRL+ALT+DEL

    • D. 

      ALT+F8

  • 4. 
    To protect data so it cannot be easily read, what technology is used?
    • A. 

      Authentication

    • B. 

      Encryption

    • C. 

      Authorization

    • D. 

      Firewalling

  • 5. 
    An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do?
    • A. 

      Manually delete the file.

    • B. 

      Re-partition the hard drive.

    • C. 

      Reload the operating system.

    • D. 

      Use a better antivirus application.

  • 6. 
    What Windows XP control panel can be used so the computer cannot be seen through My Network Places?
    • A. 

      Administrative Tools

    • B. 

      Network Connections

    • C. 

      System

    • D. 

      Add/Remove Windows Components

  • 7. 
    What Windows XP feature allows file and folder encryption?
    • A. 

      PCI/E

    • B. 

      EFS

    • C. 

      USS

    • D. 

      ENT

  • 8. 
    Which statement is true regarding network shares?
    • A. 

      Network shares cannot be accessed locally on the computer doing the sharing.

    • B. 

      A network share cannot contain encrypted files.

    • C. 

      Windows XP network shares can only be accessed by Windows-based computers.

    • D. 

      If a folder is shared, all subfolders are automatically shared.

  • 9. 
    Which of the following statements are true regarding encryption?
    • A. 

      Windows XP files can only be encrypted if the NTFS partition is marked as active.

    • B. 

      Windows XP uses USS for encrypting files and folders.

    • C. 

      You can encrypt someone else’s files if you have the correct permissions.

    • D. 

      Folders that are encrypted must be accessed using the UNC.

  • 10. 
    What security term defines what resources can be accessed and used?
    • A. 

      Encryption

    • B. 

      Authentication

    • C. 

      Authorization

    • D. 

      Access level security

  • 11. 
    What is the minimum number of characters a password should be?
    • A. 

      5

    • B. 

      6

    • C. 

      7

    • D. 

      8

  • 12. 
    Why are words like monkey, smile, and freedom not good to use as passwords?
    • A. 

      There are in password crack dictionaries.

    • B. 

      They are easy to guess.

    • C. 

      They are easy to see when typing.

    • D. 

      They are the three most commonly used passwords.

  • 13. 
    Which password would be most secure?
    • A. 

      Byteme

    • B. 

      1adyVol3

    • C. 

      CAtchm3

    • D. 

      Tennessee

  • 14. 
    What should you do if someone is looking over your shoulder as you log onto your computer?
    • A. 

      Type your password very fast

    • B. 

      Ask them to leave the room

    • C. 

      Type your password at your normal pace so you don’t make a mistake, but tap your thumb a couple of times as if you are typing a key

    • D. 

      Wait until they are not looking to type your password

  • 15. 
    What type of userid and password is kept on a Windows XP computer?
    • A. 

      Local

    • B. 

      Domain

    • C. 

      Active domain

    • D. 

      Infrastructure

  • 16. 
    What network environment has centralized servers for authentication?
    • A. 

      Local

    • B. 

      Domain

    • C. 

      Infrastructure

    • D. 

      Ad hoc

  • 17. 
    Another name for event logging is:
    • A. 

      Authentication

    • B. 

      Authorization

    • C. 

      Encryption

    • D. 

      None of the above

  • 18. 
    What security term describes scrambling data so it cannot be read?
    • A. 

      Encryption

    • B. 

      Authentication

    • C. 

      Authorization

    • D. 

      Auditing

  • 19. 
    Which file system allows administrators to assign permissions to control access to network resources including encryption?
    • A. 

      FAT32

    • B. 

      EFS

    • C. 

      CDFS

    • D. 

      NTFS

  • 20. 
    Where could you see the people who have logged onto a computer in the past 48 hours?
    • A. 

      Event View security log

    • B. 

      Device Manager security option

    • C. 

      Computer Management tool’s Local Users and Groups option

    • D. 

      Boot to Safe Mode and select the Security boot option

  • 21. 
    A wireless access point connects to the wired network. What can you do to prevent unauthorized users from accessing shared files on the wired network?
    • A. 

      Disable SSID broadcasting on the access point

    • B. 

      Enable WEP, TKIP, or AES on the access point

    • C. 

      Configure NTFS permissions on the shares

    • D. 

      Install a firewall for the networks

  • 22. 
    Which Windows XP control panel is used to configure the firewall?
    • A. 

      Network Connections

    • B. 

      Security Center

    • C. 

      System

    • D. 

      Firewall

  • 23. 
    What security term describes a program written to collect information and store it on the hard drive?
    • A. 

      Virus

    • B. 

      Intrusion detection and alerts

    • C. 

      Cookie

    • D. 

      Authentication

  • 24. 
    Which technique provides more security for a wireless network?
    • A. 

      Disable SSID broadcasting

    • B. 

      Enable WEP

    • C. 

      Enable infrastructure mode d.

    • D. 

      Change default password

  • 25. 
    A technique where an attacker captures a packet and uses computer information to pretend to be the sending computer is known as:
    • A. 

      A denial of service attack

    • B. 

      Session hijacking

    • C. 

      Spam

    • D. 

      Phishing

Back to Top Back to top