209 Test 4- 10,11,12 Flashcards
The file system has no impact on how secure a computer will be against intruders
F
Individual personal computers can be secured through the use of a smart card and user’s PIN number.
T
Locking a workstation immediately can be achieved by pressing the Windows Logo key+L abruptly on the keyboard to log off the user.
T
Pretexting is a method of social engineering that can be stopped by both users and antiphishing programs
F
The power users group has the least amount of permissions out of all the accounts on a Windows system.
F
If a folder is moved to a different location of the same volume, the folder will inherit permissions of the parent folder to which it was copied.
F
The BIOS setup password can be reset by simply removing the battery for several minutes.
T
If a wireless router or WAP is configured with a provided encryption type, that identical type must also be configured among wireless clients
T
Unused wireless connection within Windows XP and Windows Vista should be reviewed and deleted when no longer used
T
WAP and wireless routers often have firmware updates. These updates solve only operational problems, whereas added features and security enhancements remain neglected.
F
Biometrics refers to the biological information gathered from a human body to authenticate a user. All of the following are types of biometrics except ________? Fingerprint reader, retina scanner, personal identification card, voice recognition
personal identification card
Two-way firewalls provide protection against unauthorized ______ and ______ traffic
outbound and inbound
All of the following are standards for wireless encryption except ________?
EFS
Which of the following wireless encryption standards uses AES encryption?
WPA2
To prevent an attacker from detecting your wireless network signals, what should be changed from the manufacturer defaults?
Change SSID, disable the SSID broadcast, add MAC address filtering, change the default admin password
Which of the following features can be used as a simple firewall within wireless routers and WAPs?
NAT
What types of Local Security Policies can be applied to protect data residing on a system?
enable auditing, shutdown, interactive logon
Securing backups with password protection gives added protection. However, if the backup program does not support password protection, what must be done to the backup media?
physically secure it to prevent access
Social engineering is comprised of a variety methods to manipulate users into performing actions or providing information. Which of the following are among the many methods used during social engineering? pretexting, phishing, baiting
all
There are three standard account levels within Windows XP. Which of the following is not a standard account level? multiuser, guest, administrator, limited accounts
multi-user account
What feature within the BIOS can be enabled to prevent unauthorized users from altering BIOS setup information?
BIOS set up password
Which of the following settings could affect a user from joining a wireless network? incorrect SSID, incorrect encryption type, incompatible wireless adapter, incompatible operating system
incorrect SSID, incorrect encryption type, incompatible wireless adapter
Windows 2000 and Windows XP can be installed on either _____ or ______ file systems
FAT32, NTFS
A software ______ is a program designed to block unauthorized data packers while permitting authorized data packets on a network.
Firewall
EFS files can only be opened by which of the following except ________? choose 3: the domain user, the owner who encrypted them, the administrator, EFS, keyholders
the owner who encrypted them, the administrator, EFS keyholders
Reducing the resolution of a print job could drastically decrease the memory requirement for printing the page by a factor of four.
T
Leaving toner cartridges, used in laser printers, out in room light can damage the enclosed imaging drum’s surface.
T
Inkjet printers are capable of achieving best print quality with the use of all-purpose paper or media.
F
Solid ink crayons use the same shape for each color to prevent misfeeds within the solid-ink printer.
F
A page printer will not start the printing process until the entire page is received.
T