A+ Essentials Test - Domain 6.0 Security

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Lazor-beam
L
Lazor-beam
Community Contributor
Quizzes Created: 3 | Total Attempts: 515
| Attempts: 158 | Questions: 41
Please wait...
Question 1 / 41
0 %
0/100
Score 0/100
1. What security term describes scrambling data so it cannot be read?

Explanation

Encryption is the process of converting plain text or data into a coded form, known as ciphertext, to prevent unauthorized access. It ensures that only authorized individuals with the proper decryption key can access and read the data. By scrambling the data, encryption provides confidentiality and protects sensitive information from being understood or intercepted by unauthorized parties.

Submit
Please wait...
About This Quiz
A+ Essentials Test - Domain 6.0 Security - Quiz


Tests for basic knowledge of the Security Domain 6.0 portion of A+ Essentials.

2. Which password would be most secure?

Explanation

The password "1adyVol3" would be the most secure because it includes a combination of uppercase and lowercase letters, as well as numbers. This combination makes it harder for hackers to guess or crack the password. Additionally, the password is not a common word or phrase, further increasing its security.

Submit
3. To protect data so it cannot be easily read, what technology is used?

Explanation

Encryption is the technology used to protect data so that it cannot be easily read. It involves converting the information into an unreadable format using algorithms and keys. Only authorized individuals or systems with the correct decryption keys can access and understand the data. Encryption is widely used in various applications such as secure communication, online transactions, and data storage to ensure the confidentiality and integrity of sensitive information.

Submit
4. What encryption is used with wireless networks?

Explanation

WEP (Wired Equivalent Privacy) is the encryption used with wireless networks. It was one of the earliest encryption protocols used to secure wireless networks. However, WEP is now considered to be weak and easily crackable, as it has several vulnerabilities. Despite its weaknesses, it is still supported by some older devices and may be used in legacy systems.

Submit
5. What statement is true regarding a firewall on a computer that attaches to the network wirelessly? Note that the wireless network connects to the wired network for Internet access.

Explanation

The firewall can protect the computer from unauthorized access and malicious attacks, but it cannot encrypt or secure the data that is transmitted between the computer and the access point. Encryption and securing of data transmission is typically handled by other protocols and security measures such as VPNs or SSL/TLS.

Submit
6. Technology that allows you to create a tunnel from one network device to another over the Internet is:

Explanation

A VPN, or Virtual Private Network, is a technology that allows users to create a secure and encrypted tunnel from one network device to another over the Internet. This enables users to access a private network remotely, ensuring that their data is protected and their online activities remain private. VPNs are commonly used by businesses and individuals to establish secure connections and protect sensitive information from unauthorized access or interception.

Submit
7. You see a user’s password taped to the bottom of the keyboard. You should...

Explanation

The correct answer is to tell the user that you saw their password taped to the bottom of the keyboard and recommend that they change it and not write it down. This is the appropriate action because it promotes good security practices by discouraging the user from writing down their password and encourages them to create a stronger, more secure password. Additionally, informing the user directly allows for open communication and trust-building between the user and the IT professional.

Submit
8. A fingerprint scanner is what type of device?

Explanation

A fingerprint scanner is classified as a biometric device because it uses unique physical characteristics, such as the pattern of ridges and valleys on a person's fingertip, to identify and authenticate individuals. Biometric devices are designed to capture and analyze biological data to verify a person's identity, making them a secure and reliable method of authentication. Therefore, the correct answer is biometric.

Submit
9. Where could you see the people who have logged onto a computer in the past 48 hours?

Explanation

The correct answer is Event View security log. The Event View security log is a tool in Windows operating systems that records security-related events, including user logins and logouts. By checking the Event View security log, you can see a list of people who have logged onto a computer in the past 48 hours. This log provides information such as the date and time of login, the user account used, and any relevant security events associated with the login.

Submit
10. A lot of email comes to you from xxxpharmacy.com. This is an example of:

Explanation

The correct answer is spamming. This is because the question states that a lot of email comes from xxxpharmacy.com, indicating that the emails are unsolicited and likely unwanted. Spamming refers to the act of sending unsolicited and often irrelevant or inappropriate messages or advertisements to a large number of recipients.

Submit
11. What is the minimum number of characters a password should be?

Explanation

A password should be at least 8 characters long to ensure a higher level of security. Shorter passwords are easier to guess or crack through brute force attacks. By setting a minimum length of 8 characters, it becomes more difficult for unauthorized individuals to gain access to the account or system.

Submit
12. An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do?

Explanation

If the antivirus application has detected a file as part of a virus but is unable to delete it, manually deleting the file would be the appropriate action to take. This involves locating the file in the system and deleting it manually to remove the potential threat. Re-partitioning the hard drive or reloading the operating system may not be necessary or effective in this scenario. Using a better antivirus application could be an option, but it is not mentioned as the immediate solution in this case.

Submit
13. What keystrokes are used to lock a Windows XP computer?

Explanation

To lock a Windows XP computer, the correct keystrokes are CTRL+ALT+DEL. This key combination brings up the Windows Security dialog box, where the user can choose to lock the computer by clicking on the "Lock Computer" option. This is a security feature that allows users to quickly lock their computer when they step away, preventing unauthorized access to their files and applications.

Submit
14. What network environment has centralized servers for authentication?

Explanation

A domain network environment has centralized servers for authentication. In a domain network, a central server called a domain controller is responsible for authenticating users and managing their access to network resources. This centralized authentication system allows for better security and easier management of user accounts and permissions.

Submit
15. Why are words like monkey, smile, and freedom not good to use as passwords?

Explanation

The reason why words like monkey, smile, and freedom are not good to use as passwords is because they are present in password crack dictionaries. These dictionaries are commonly used by hackers and password cracking software to guess and crack passwords. Therefore, using these words as passwords makes it easier for unauthorized individuals to gain access to personal accounts and sensitive information.

Submit
16. What type of userid and password is kept on a Windows XP computer?

Explanation

On a Windows XP computer, the type of userid and password that is kept is "local". This means that the user account and password are stored locally on the computer itself, and are not associated with a domain or an active directory. This type of account is typically used for individual users who do not need access to network resources or do not belong to a larger network infrastructure.

Submit
17. You are in a manager’s office on a service call and the manager is on a phone call talking about firing someone. What should you do?

Explanation

In this situation, it is best to quietly leave the room. As a service call, it is not your place to be involved in the manager's conversation about firing someone. Interrupting or eavesdropping on the call would be unprofessional and inappropriate. By quietly leaving the room, you respect the manager's privacy and allow them to handle the call without any distractions or interruptions.

Submit
18. Which of the following cannot help when dealing with an irate customer?

Explanation

Arguing with the customer cannot help when dealing with an irate customer because it can escalate the situation further and make the customer even more upset. Arguing creates a confrontational environment and can damage the relationship with the customer. It is important to remain calm, listen attentively, and show empathy towards the customer's concerns in order to effectively resolve the issue and maintain a positive customer experience.

Submit
19. You are on a service call to fix a customer’s printer when they ask you to help with a network firewall issue. This is not part of your normal responsibilities. What should you do?

Explanation

In this scenario, the best course of action is to call your supervisor to find the best company resource to recommend to the customer. As a service technician, it is important to focus on your assigned task and expertise. Helping with a network firewall issue is beyond your normal responsibilities, so it is appropriate to seek guidance from your supervisor. They can provide the necessary support and recommend the appropriate resources to assist the customer with their firewall issue.

Submit
20. Another name for event logging is:

Explanation

The given question asks for another name for event logging. However, none of the provided options (authentication, authorization, encryption) are alternative names for event logging. Therefore, the correct answer is "none of the above".

Submit
21. A technique where an attacker captures a packet and uses computer information to pretend to be the sending computer is known as:

Explanation

Session hijacking is a technique where an attacker captures a packet and uses computer information to pretend to be the sending computer. This allows the attacker to gain unauthorized access to a session or session information, potentially allowing them to impersonate the user and perform malicious actions. It is a form of cyber attack that aims to compromise the integrity and confidentiality of a user's session.

Submit
22. Which technique provides more security for a wireless network?

Explanation

Enabling WEP (Wired Equivalent Privacy) provides more security for a wireless network compared to the other options listed. WEP is a security protocol that encrypts data transmitted over the network, making it difficult for unauthorized users to intercept and decipher the information. While WEP is not as secure as more modern encryption methods, it still offers a level of protection that disabling SSID broadcasting, enabling infrastructure mode, or changing the default password do not provide.

Submit
23. What Windows XP feature allows file and folder encryption?

Explanation

EFS stands for Encrypting File System, which is a feature in Windows XP that allows file and folder encryption. This feature provides a way to securely store sensitive data by encrypting it with a unique key, making it unreadable to unauthorized users. EFS helps protect data from being accessed or tampered with by encrypting it at the file level, ensuring that only authorized users with the appropriate encryption key can access the encrypted files and folders.

Submit
24. What security term describes a program written to collect information and store it on the hard drive?

Explanation

A cookie is a small piece of data that is stored on a user's computer by a website. It is used to collect information and store it on the hard drive. Cookies are commonly used for authentication, tracking user preferences, and providing personalized experiences. While cookies are generally harmless, they can also be used for tracking and profiling users, which raises privacy concerns. Therefore, it is important for users to manage their cookies and be cautious of websites that may misuse them.

Submit
25. Which of the following is an example of social engineering?

Explanation

Phishing is a form of social engineering where attackers impersonate a trustworthy entity to deceive individuals into revealing sensitive information such as passwords, credit card details, or social security numbers. They typically use deceptive emails, messages, or websites that appear legitimate to trick victims into providing their personal information. Unlike spamming, spyware, or malware, which are more focused on spreading malicious software or unwanted content, phishing relies on manipulating human psychology and trust to exploit individuals for personal gain.

Submit
26. Which of the following cannot be prevented through firewall, antivirus, antispyware, antigrayware, encryption, and domain authentication techniques?

Explanation

Social engineering cannot be prevented through firewall, antivirus, antispyware, antigrayware, encryption, and domain authentication techniques because it involves manipulating and deceiving individuals to gain unauthorized access to sensitive information or systems. This type of attack relies on human interaction and psychological manipulation rather than technical vulnerabilities, making it difficult for traditional security measures to detect and prevent.

Submit
27. Which file system allows administrators to assign permissions to control access to network resources including encryption?

Explanation

NTFS (New Technology File System) is the correct answer because it allows administrators to assign permissions to control access to network resources, including encryption. NTFS supports advanced security features such as file and folder permissions, encryption, and auditing. It provides a more robust and secure file system compared to other options like FAT32, EFS (Encrypting File System), and CDFS (Compact Disc File System). NTFS is commonly used in Windows operating systems to ensure data integrity and protect sensitive information from unauthorized access.

Submit
28. What should you do if someone is looking over your shoulder as you log onto your computer?

Explanation

It is important to wait until the person is not looking to type your password because typing it while someone is looking over your shoulder increases the risk of them seeing and remembering your password. This can compromise the security of your computer and potentially lead to unauthorized access to your personal information. It is always best to ensure privacy when entering sensitive information like passwords.

Submit
29. Which Windows XP control panel is used to configure the firewall?

Explanation

The correct answer is Security Center. The Security Center control panel in Windows XP allows users to configure the firewall settings. It provides information about the status of various security features on the computer, including the firewall, antivirus software, and automatic updates. By accessing the Security Center, users can enable or disable the firewall, customize its settings, and ensure that their computer is protected against unauthorized access and malicious attacks.

Submit
30. What type of scripts are Internet programs to make a web page dynamic?

Explanation

Active scripts are Internet programs that make a web page dynamic. These scripts are responsible for adding interactivity and functionality to web pages, allowing users to interact with the content and perform various actions. They can be used to validate forms, create animations, update content dynamically, and much more. Active scripts are essential for creating dynamic and engaging websites.

Submit
31. What security term defines what resources can be accessed and used?

Explanation

Authorization is the security term that defines what resources can be accessed and used. It is the process of granting or denying access to certain resources based on the user's identity, role, or other criteria. It ensures that only authorized individuals or entities are allowed to access specific resources, protecting sensitive information and preventing unauthorized use or misuse of resources.

Submit
32. What Windows XP control panel can be used so the computer cannot be seen through My Network Places?

Explanation

The correct answer is Administrative Tools. The Administrative Tools control panel in Windows XP allows users to manage various system settings and configurations. It does not directly control the visibility of the computer through My Network Places, but it provides access to other tools and settings that can be used to modify network visibility and sharing options. Therefore, by using the Administrative Tools control panel, users can configure the necessary settings to prevent the computer from being seen through My Network Places.

Submit
33. What type of unsolicited message type is designed to damage your computer?

Explanation

Malware is a type of unsolicited message that is specifically designed to damage or disrupt a computer system. It includes various harmful software such as viruses, worms, Trojan horses, ransomware, and adware. These malicious programs can infiltrate a computer through various means, such as email attachments, infected websites, or software downloads. Once installed, malware can steal sensitive information, corrupt files, slow down the system, or even grant unauthorized access to hackers. Therefore, it is crucial to have proper antivirus software and regularly update it to protect against malware attacks.

Submit
34. What technology is also known as a hardware token?

Explanation

A security token is also known as a hardware token because it is a physical device that is used to authenticate a user's identity and provide secure access to a system or network. It typically generates a unique code or password that is required to log in or perform certain actions. This hardware token adds an extra layer of security as it cannot be easily replicated or hacked, making it a reliable form of authentication.

Submit
35. What is SSID broadcasting?

Explanation

SSID broadcasting refers to the access point constantly sending the name of the wireless network into the air. This allows wireless devices to detect and connect to the network by displaying the available network names in their network list. It is a method used by access points to make the network easily discoverable by wireless devices.

Submit
36. Which of the following statements are true regarding encryption?

Explanation

The correct answer is that you can encrypt someone else's files if you have the correct permissions. This means that if you have the necessary access rights and permissions, you can encrypt files that belong to another user or account on the system. Encryption allows for the secure protection of sensitive data, and in Windows XP, it is possible to encrypt files belonging to others as long as you have the appropriate permissions granted to you.

Submit
37. What security term is used to describe logging keystrokes to obtain passwords?

Explanation

Spyware is the correct answer because it refers to a type of malicious software that is designed to secretly monitor and collect information from a user's computer. This can include logging keystrokes to obtain passwords and other sensitive information without the user's knowledge or consent.

Submit
38. Which statement is true regarding network shares?

Explanation

When a folder is shared on a network, it allows other users to access the contents of that folder. The statement "If a folder is shared, all subfolders are automatically shared" is true because when a folder is shared, the sharing settings can be applied to all subfolders within it. This means that the subfolders will also be accessible to other users on the network without the need for separate sharing settings. This simplifies the sharing process and allows for easier access to all the contents within the shared folder and its subfolders.

Submit
39. A wireless access point connects to the wired network. What can you do to prevent unauthorized users from accessing shared files on the wired network?

Explanation

To prevent unauthorized users from accessing shared files on the wired network, configuring NTFS permissions on the shares is the most effective solution. NTFS permissions allow you to control and restrict access to files and folders based on user accounts and groups. By properly configuring these permissions, you can specify who can read, write, modify, or delete files on the network. This ensures that only authorized users have access to the shared files, protecting sensitive information and preventing unauthorized access. Disabling SSID broadcasting, enabling encryption protocols, or installing a firewall can enhance network security but do not directly address access to shared files on the wired network.

Submit
40. What are the two original types of authentication used in wireless network?

Explanation

The two original types of authentication used in wireless networks are "open" and "shared". "Open" authentication allows any device to connect to the network without providing any credentials. On the other hand, "shared" authentication requires a shared key or password to be entered by the user in order to connect to the network. This type of authentication provides a basic level of security by limiting access to authorized users who possess the shared key.

Submit
41. What is the difference between 40-bit and 64-bit WEP?

Explanation

The correct answer is that there is no difference between 40-bit and 64-bit WEP. This means that both encryption methods have the same level of security and functionality. Both use the same initialization vector and do not have dynamically changing encryption keys.

Submit
View My Results

Quiz Review Timeline (Updated): Nov 1, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 01, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2008
    Quiz Created by
    Lazor-beam
Cancel
  • All
    All (41)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What security term describes scrambling data so it cannot be read?
Which password would be most secure?
To protect data so it cannot be easily read, what technology is used?
What encryption is used with wireless networks?
What statement is true regarding a firewall on a computer that...
Technology that allows you to create a tunnel from one network device...
You see a user’s password taped to the bottom of the keyboard. You...
A fingerprint scanner is what type of device?
Where could you see the people who have logged onto a computer in the...
A lot of email comes to you from xxxpharmacy.com. This is an example...
What is the minimum number of characters a password should be?
An antivirus application has found a file that states the file is part...
What keystrokes are used to lock a Windows XP computer?
What network environment has centralized servers for authentication?
Why are words like monkey, smile, and freedom not good to use as...
What type of userid and password is kept on a Windows XP computer?
You are in a manager’s office on a service call and the manager is...
Which of the following cannot help when dealing with an irate...
You are on a service call to fix a customer’s printer when they ask...
Another name for event logging is:
A technique where an attacker captures a packet and uses computer...
Which technique provides more security for a wireless network?
What Windows XP feature allows file and folder encryption?
What security term describes a program written to collect information...
Which of the following is an example of social engineering?
Which of the following cannot be prevented through firewall,...
Which file system allows administrators to assign permissions to...
What should you do if someone is looking over your shoulder as you log...
Which Windows XP control panel is used to configure the firewall?
What type of scripts are Internet programs to make a web page dynamic?
What security term defines what resources can be accessed and used?
What Windows XP control panel can be used so the computer cannot be...
What type of unsolicited message type is designed to damage your...
What technology is also known as a hardware token?
What is SSID broadcasting?
Which of the following statements are true regarding encryption?
What security term is used to describe logging keystrokes to obtain...
Which statement is true regarding network shares?
A wireless access point connects to the wired network. What can you do...
What are the two original types of authentication used in wireless...
What is the difference between 40-bit and 64-bit WEP?
Alert!

Advertisement