1002 practice exam 1 Flashcards

1
Q

A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?

A

Require laptop hard drives to be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

. The type of security threat that uses computers or other networks to accept and pass on viruses is called:

A

botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following?

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in the user’s My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur?

A

EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When securing a mobile device, which of the following types of screen locks is the MOST secure?

A

Fingerprint lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?

A

Drive wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

. A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees’ laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?

A

Enable MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend?

A

Enable MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?

A

Check for and apply a firmware update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

. A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?

A

Physical destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).

A
  • Use multi-factor authentication

* . Educate end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

. A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?

A

Shredding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

. Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? (Select TWO).

A
  • Rename default accounts

* Disable guest account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following prevention methods is considered to be digital security?

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following Windows features would be used to encrypt a single file or folder?

A

EFS

17
Q

A user wants to save a file into another user’s directory, but the file save is denied. Which of the following is the MOST likely reason the file save cannot be completed?

A

The user requires write permissions to the folder

18
Q

. A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation?

A

Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours.

19
Q

. A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?

A

443