Tests for basic knowledge of the Security Domain 6.0 portion of A+ Essentials.
USS
Hardware token
Biometric
Key fob
Rate this question:
F1
CTRL+ALT+ESC
CTRL+ALT+DEL
ALT+F8
Rate this question:
Authentication
Encryption
Authorization
Firewalling
Rate this question:
Manually delete the file.
Re-partition the hard drive.
Reload the operating system.
Use a better antivirus application.
Rate this question:
Administrative Tools
Network Connections
System
Add/Remove Windows Components
Rate this question:
PCI/E
EFS
USS
ENT
Rate this question:
Network shares cannot be accessed locally on the computer doing the sharing.
A network share cannot contain encrypted files.
Windows XP network shares can only be accessed by Windows-based computers.
If a folder is shared, all subfolders are automatically shared.
Rate this question:
Windows XP files can only be encrypted if the NTFS partition is marked as active.
Windows XP uses USS for encrypting files and folders.
You can encrypt someone else’s files if you have the correct permissions.
Folders that are encrypted must be accessed using the UNC.
Rate this question:
Encryption
Authentication
Authorization
Access level security
Rate this question:
5
6
7
8
Rate this question:
There are in password crack dictionaries.
They are easy to guess.
They are easy to see when typing.
They are the three most commonly used passwords.
Rate this question:
Byteme
1adyVol3
CAtchm3
Tennessee
Rate this question:
Type your password very fast
Ask them to leave the room
Type your password at your normal pace so you don’t make a mistake, but tap your thumb a couple of times as if you are typing a key
Wait until they are not looking to type your password
Rate this question:
Local
Domain
Active domain
Infrastructure
Rate this question:
Local
Domain
Infrastructure
Ad hoc
Rate this question:
Authentication
Authorization
Encryption
None of the above
Rate this question:
Encryption
Authentication
Authorization
Auditing
Rate this question:
FAT32
EFS
CDFS
NTFS
Rate this question:
Event View security log
Device Manager security option
Computer Management tool’s Local Users and Groups option
Boot to Safe Mode and select the Security boot option
Rate this question:
Disable SSID broadcasting on the access point
Enable WEP, TKIP, or AES on the access point
Configure NTFS permissions on the shares
Install a firewall for the networks
Rate this question:
Network Connections
Security Center
System
Firewall
Rate this question:
Virus
Intrusion detection and alerts
Cookie
Authentication
Rate this question:
Disable SSID broadcasting
Enable WEP
Enable infrastructure mode d.
Change default password
Rate this question:
A denial of service attack
Session hijacking
Spam
Phishing
Rate this question:
Phishing
Social
Active
Domain
Rate this question:
Phishing
Social engineering
Malware
Spyware
Rate this question:
Spamming
Phishing
Spyware
Malware
Rate this question:
Spamming
Phishing
Spyware
Malware
Rate this question:
Spamming
Phishing
Spyware
Malware
Rate this question:
Spamming
Social engineering
Physical attacks
Denial of service attacks
Rate this question:
VPN
Phishing
Encryption
WEP
Rate this question:
Open and shared
WEP and TKIP
WEP and AES
Domain and local
Rate this question:
Shared
WEP
VPN
SSID
Rate this question:
The initialization vector is different
With 64-bit, the encryption keys dynamically change
64-bit is stronger encryption
There is no difference
Rate this question:
The firewall can protect the computer, but not the data sent between the computer and the access point
The firewall cannot protect the computer.
The firewall can protect the computer only from other wireless NICs
The firewall can protect the computer only from viruses and spyware.
Rate this question:
The method the access point uses to reach all wireless NICs with a single message
A means for the access point to send the wireless encryption keys to all wireless NICs for network access
The access point constantly sending the name of the wireless network into the air
The access method used for 802.11 a, b, g, and n wireless networks
Rate this question:
Having attentive body language
Being assertive
Arguing with the customer
Being empathetic
Rate this question:
Use the password to access the computer so you can solve the problem quicker.
Tell the user that you saw it and recommend that they change it and not write it down.
Inform your supervisor.
Inform the user’s supervisor.
Rate this question:
Call your supervisor to find the best company resource to recommend to the customer.
Try to solve the issue to the best of your ability.
Report the user to their supervisor.
Empathetically tell the customer you cannot and report the request to your supervisor.
Rate this question:
Quietly leave the room.
Call your boss and ask for a recommendation.
Inform the manager’s supervisor.
Let your presence be known to the manager.
Rate this question:
Quiz Review Timeline (Updated): Nov 1, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.