220-1002 Quiz 3 Flashcards
The validity of the whole access control system depends on the credentials for an account being known to the account holder only. What is the format of the credentials called?
Authentication factor
BIOS (Basic input/output system )/UEFI (Unified Extensible Firmware Interface) Passwords
Key fob
Two-factor authentication
Authentication factor
You are configuring Email on a user's mobile device. You decide to let the application detect and setup the Email client with little intervention. What type of configuration technology is being used? Airplane mode Autodiscover Post office protocol Pretty good privacy
Autodiscover
What Windows command updates group policy?
gpupdate
Which of the following mobile touch types is a newer technology in mobiles that features virtual key presses or touches as feeling more real?
Multitouch
Touchscreen
Haptic Feedback
Proximity Sensor
Haptic Feedback
Which of the following Windows Command Prompt commands can be used to list all directory’s files and subdirectories contained in the current directory? (Select 2 answers)
dir dir /? dir *.* dir /all dir /list
dir
dir .
Password protection policies mitigate against the risk of attackers being able to compromise an account and use it to launch other attacks on the network. What are some examples that are used by Windows? (Select all that apply.)
User cannot change password
Minimum password length
Enforce password history/Minimum password age
Password must meet complexity requirements
User cannot change password
Minimum password length
Enforce password history/Minimum password age
Password must meet complexity requirements
A user downloads a game from a blogging website and installs it. Unbeknownst to the user, the game also included a hidden keylogger that is now installed on the computer. Malicious software that is disguised as legitimate software is known as which of the following?
Worms
Backdoor
Trojan Horse
Spyware
Trojan Horse
Your organization is likely going to start developing applications for the iOS operating system. Which programming language will be used?
Java
Swift
Javascript
Python
Swift
Which of the following ports is a proprietary port that is used on Apple iOS devices?
Lightning
Thunderbolt
USB C (Universal Serial Bus)
SATA (Serial Advanced Technology Attachment)
Lightning
What sets out procedures and reporting guidelines for dealing with security incidents? Select all that apply.
Incident Response Policy
Security Incident
Security Incident Handling Lifecycle
Chain of Custody Form
Incident Response Policy
Security Incident Handling Lifecycle
The rise in consciousness of identity theft as a serious crime and growing threat means that there is an increasing impetus on government, educational, and commercial organizations to take steps to process more information more sensitively and securely. What is the name of the data that can be used to identify, contact, or locate an individual or, in the case of identity theft, to impersonate them.
Protected Health Information (PHI)
Payment Card Industry Data Security Standard (PCI DSS)
Personally Identifiable Information (PII)
Top Secret
Personally Identifiable Information (PII)
The National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide special publication SP800-61 identifies several stages in an incident response lifecycle. Which stage is determining whether an incident has taken place and assessing how severe it might be, followed by notification of the incident to stakeholders?
Post-incident Activity
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Detection and Analysis
Windows is commercial software, meaning it must be paid for. A condition of installing Windows is accepting the End User License Agreement (EULA). Microsoft requires you to activate Windows when you install it, which helps them to verify that you are not breaking the terms of the license. What license would be used for personal use and may be transferred between computers but may only be installed on one computer at any one time?
Retail
Original Equipment Manufacturer (OEM)
Volume
Server
Retail
Once a system has been cleaned then the appropriate steps need to be taken to prevent re-infection. What is it called when the Anti-Virus (A-V) software intercepts an Operating System (OS) call to open a file and scans the file before allowing or preventing it from being opened?
Configuring On-access Scanning
Configuring Scheduled Scans
DNS Configuration
Software Firewalls
Configuring On-access Scanning
Document classification restricts who may see the document’s contents. Classification is generally divided into several levels, following military usage. What level restricts viewing to the owner organization or to third parties under a Non-disclosure Agreement (NDA)?
Unclassified
Classified
Confidential
Secret
Classified