A+ Essentials Test - Domain 6.0 Security

41 Questions | Total Attempts: 133

SettingsSettingsSettings
A Plus Essential Quizzes & Trivia

Tests for basic knowledge of the Security Domain 6. 0 portion of A+ Essentials.


Questions and Answers
  • 1. 
    What technology is also known as a hardware token?
    • A. 

      Key card

    • B. 

      RFID

    • C. 

      Hardware fob

    • D. 

      Security token

  • 2. 
    A fingerprint scanner is what type of device?
    • A. 

      USS

    • B. 

      Hardware token

    • C. 

      Biometric

    • D. 

      Key fob

  • 3. 
    What keystrokes are used to lock a Windows XP computer?
    • A. 

      F1

    • B. 

      CTRL+ALT+ESC

    • C. 

      CTRL+ALT+DEL

    • D. 

      ALT+F8

  • 4. 
    To protect data so it cannot be easily read, what technology is used?
    • A. 

      Authentication

    • B. 

      Encryption

    • C. 

      Authorization

    • D. 

      Firewalling

  • 5. 
    An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do?
    • A. 

      Manually delete the file.

    • B. 

      Re-partition the hard drive.

    • C. 

      Reload the operating system.

    • D. 

      Use a better antivirus application.

  • 6. 
    What Windows XP control panel can be used so the computer cannot be seen through My Network Places?
    • A. 

      Administrative Tools

    • B. 

      Network Connections

    • C. 

      System

    • D. 

      Add/Remove Windows Components

  • 7. 
    What Windows XP feature allows file and folder encryption?
    • A. 

      PCI/E

    • B. 

      EFS

    • C. 

      USS

    • D. 

      ENT

  • 8. 
    Which statement is true regarding network shares?
    • A. 

      Network shares cannot be accessed locally on the computer doing the sharing.

    • B. 

      A network share cannot contain encrypted files.

    • C. 

      Windows XP network shares can only be accessed by Windows-based computers.

    • D. 

      If a folder is shared, all subfolders are automatically shared.

  • 9. 
    Which of the following statements are true regarding encryption?
    • A. 

      Windows XP files can only be encrypted if the NTFS partition is marked as active.

    • B. 

      Windows XP uses USS for encrypting files and folders.

    • C. 

      You can encrypt someone else’s files if you have the correct permissions.

    • D. 

      Folders that are encrypted must be accessed using the UNC.

  • 10. 
    What security term defines what resources can be accessed and used?
    • A. 

      Encryption

    • B. 

      Authentication

    • C. 

      Authorization

    • D. 

      Access level security

  • 11. 
    What is the minimum number of characters a password should be?
    • A. 

      5

    • B. 

      6

    • C. 

      7

    • D. 

      8

  • 12. 
    Why are words like monkey, smile, and freedom not good to use as passwords?
    • A. 

      There are in password crack dictionaries.

    • B. 

      They are easy to guess.

    • C. 

      They are easy to see when typing.

    • D. 

      They are the three most commonly used passwords.

  • 13. 
    Which password would be most secure?
    • A. 

      Byteme

    • B. 

      1adyVol3

    • C. 

      CAtchm3

    • D. 

      Tennessee

  • 14. 
    What should you do if someone is looking over your shoulder as you log onto your computer?
    • A. 

      Type your password very fast

    • B. 

      Ask them to leave the room

    • C. 

      Type your password at your normal pace so you don’t make a mistake, but tap your thumb a couple of times as if you are typing a key

    • D. 

      Wait until they are not looking to type your password

  • 15. 
    What type of userid and password is kept on a Windows XP computer?
    • A. 

      Local

    • B. 

      Domain

    • C. 

      Active domain

    • D. 

      Infrastructure

  • 16. 
    What network environment has centralized servers for authentication?
    • A. 

      Local

    • B. 

      Domain

    • C. 

      Infrastructure

    • D. 

      Ad hoc

  • 17. 
    Another name for event logging is:
    • A. 

      Authentication

    • B. 

      Authorization

    • C. 

      Encryption

    • D. 

      None of the above

  • 18. 
    What security term describes scrambling data so it cannot be read?
    • A. 

      Encryption

    • B. 

      Authentication

    • C. 

      Authorization

    • D. 

      Auditing

  • 19. 
    Which file system allows administrators to assign permissions to control access to network resources including encryption?
    • A. 

      FAT32

    • B. 

      EFS

    • C. 

      CDFS

    • D. 

      NTFS

  • 20. 
    Where could you see the people who have logged onto a computer in the past 48 hours?
    • A. 

      Event View security log

    • B. 

      Device Manager security option

    • C. 

      Computer Management tool’s Local Users and Groups option

    • D. 

      Boot to Safe Mode and select the Security boot option

  • 21. 
    A wireless access point connects to the wired network. What can you do to prevent unauthorized users from accessing shared files on the wired network?
    • A. 

      Disable SSID broadcasting on the access point

    • B. 

      Enable WEP, TKIP, or AES on the access point

    • C. 

      Configure NTFS permissions on the shares

    • D. 

      Install a firewall for the networks

  • 22. 
    Which Windows XP control panel is used to configure the firewall?
    • A. 

      Network Connections

    • B. 

      Security Center

    • C. 

      System

    • D. 

      Firewall

  • 23. 
    What security term describes a program written to collect information and store it on the hard drive?
    • A. 

      Virus

    • B. 

      Intrusion detection and alerts

    • C. 

      Cookie

    • D. 

      Authentication

  • 24. 
    Which technique provides more security for a wireless network?
    • A. 

      Disable SSID broadcasting

    • B. 

      Enable WEP

    • C. 

      Enable infrastructure mode d.

    • D. 

      Change default password

  • 25. 
    A technique where an attacker captures a packet and uses computer information to pretend to be the sending computer is known as:
    • A. 

      A denial of service attack

    • B. 

      Session hijacking

    • C. 

      Spam

    • D. 

      Phishing

  • 26. 
    What type of scripts are Internet programs to make a web page dynamic?
    • A. 

      Phishing

    • B. 

      Social

    • C. 

      Active

    • D. 

      Domain

  • 27. 
    What security term is used to describe logging keystrokes to obtain passwords?
    • A. 

      Phishing

    • B. 

      Social engineering

    • C. 

      Malware

    • D. 

      Spyware

  • 28. 
    A lot of email comes to you from xxxpharmacy.com. This is an example of:
    • A. 

      Spamming

    • B. 

      Phishing

    • C. 

      Spyware

    • D. 

      Malware

  • 29. 
    What type of unsolicited message type is designed to damage your computer?
    • A. 

      Spamming

    • B. 

      Phishing

    • C. 

      Spyware

    • D. 

      Malware

  • 30. 
    Which of the following is an example of social engineering?
    • A. 

      Spamming

    • B. 

      Phishing

    • C. 

      Spyware

    • D. 

      Malware

  • 31. 
    Which of the following cannot be prevented through firewall, antivirus, antispyware, antigrayware, encryption, and domain authentication techniques?
    • A. 

      Spamming

    • B. 

      Social engineering

    • C. 

      Physical attacks

    • D. 

      Denial of service attacks

  • 32. 
    Technology that allows you to create a tunnel from one network device to another over the Internet is:
    • A. 

      VPN

    • B. 

      Phishing

    • C. 

      Encryption

    • D. 

      WEP

  • 33. 
    What are the two original types of authentication used in wireless network?
    • A. 

      Open and shared

    • B. 

      WEP and TKIP

    • C. 

      WEP and AES

    • D. 

      Domain and local

  • 34. 
    What encryption is used with wireless networks?
    • A. 

      Shared

    • B. 

      WEP

    • C. 

      VPN

    • D. 

      SSID

  • 35. 
    What is the difference between 40-bit and 64-bit WEP?
    • A. 

      The initialization vector is different

    • B. 

      With 64-bit, the encryption keys dynamically change

    • C. 

      64-bit is stronger encryption

    • D. 

      There is no difference

  • 36. 
    What statement is true regarding a firewall on a computer that attaches to the network wirelessly? Note that the wireless network connects to the wired network for Internet access.
    • A. 

      The firewall can protect the computer, but not the data sent between the computer and the access point

    • B. 

      The firewall cannot protect the computer.

    • C. 

      The firewall can protect the computer only from other wireless NICs

    • D. 

      The firewall can protect the computer only from viruses and spyware.

  • 37. 
    What is SSID broadcasting?
    • A. 

      The method the access point uses to reach all wireless NICs with a single message

    • B. 

      A means for the access point to send the wireless encryption keys to all wireless NICs for network access

    • C. 

      The access point constantly sending the name of the wireless network into the air

    • D. 

      The access method used for 802.11 a, b, g, and n wireless networks

  • 38. 
    Which of the following cannot help when dealing with an irate customer?
    • A. 

      Having attentive body language

    • B. 

      Being assertive

    • C. 

      Arguing with the customer

    • D. 

      Being empathetic

  • 39. 
    You see a user’s password taped to the bottom of the keyboard. You should...
    • A. 

      Use the password to access the computer so you can solve the problem quicker.

    • B. 

      Tell the user that you saw it and recommend that they change it and not write it down.

    • C. 

      Inform your supervisor.

    • D. 

      Inform the user’s supervisor.

  • 40. 
    You are on a service call to fix a customer’s printer when they ask you to help with a network firewall issue. This is not part of your normal responsibilities. What should you do?
    • A. 

      Call your supervisor to find the best company resource to recommend to the customer.

    • B. 

      Try to solve the issue to the best of your ability.

    • C. 

      Report the user to their supervisor.

    • D. 

      Empathetically tell the customer you cannot and report the request to your supervisor.

  • 41. 
    You are in a manager’s office on a service call and the manager is on a phone call talking about firing someone. What should you do?
    • A. 

      Quietly leave the room.

    • B. 

      Call your boss and ask for a recommendation.

    • C. 

      Inform the manager’s supervisor.

    • D. 

      Let your presence be known to the manager.