220-1002 Quiz 3 Flashcards

1
Q

The validity of the whole access control system depends on the credentials for an account being known to the account holder only. What is the format of the credentials called?

Authentication factor

BIOS (Basic input/output system )/UEFI (Unified Extensible Firmware Interface) Passwords

Key fob

Two-factor authentication

A

Authentication factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
You are configuring Email on a user's mobile device. You decide to let the application detect and setup the Email client with little intervention. What type of configuration technology is being used?
Airplane mode
Autodiscover
Post office protocol
Pretty good privacy
A

Autodiscover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Windows command updates group policy?

A

gpupdate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following mobile touch types is a newer technology in mobiles that features virtual key presses or touches as feeling more real?

Multitouch
Touchscreen
Haptic Feedback
Proximity Sensor

A

Haptic Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following Windows Command Prompt commands can be used to list all directory’s files and subdirectories contained in the current directory? (Select 2 answers)

dir
dir /?
dir *.*
dir /all
dir /list
A

dir

dir .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password protection policies mitigate against the risk of attackers being able to compromise an account and use it to launch other attacks on the network. What are some examples that are used by Windows? (Select all that apply.)

User cannot change password
Minimum password length
Enforce password history/Minimum password age
Password must meet complexity requirements

A

User cannot change password
Minimum password length
Enforce password history/Minimum password age
Password must meet complexity requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user downloads a game from a blogging website and installs it. Unbeknownst to the user, the game also included a hidden keylogger that is now installed on the computer. Malicious software that is disguised as legitimate software is known as which of the following?

Worms
Backdoor
Trojan Horse
Spyware

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your organization is likely going to start developing applications for the iOS operating system. Which programming language will be used?

Java
Swift
Javascript
Python

A

Swift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following ports is a proprietary port that is used on Apple iOS devices?

Lightning
Thunderbolt
USB C (Universal Serial Bus)
SATA (Serial Advanced Technology Attachment)

A

Lightning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What sets out procedures and reporting guidelines for dealing with security incidents? Select all that apply.

Incident Response Policy
Security Incident
Security Incident Handling Lifecycle
Chain of Custody Form

A

Incident Response Policy

Security Incident Handling Lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The rise in consciousness of identity theft as a serious crime and growing threat means that there is an increasing impetus on government, educational, and commercial organizations to take steps to process more information more sensitively and securely. What is the name of the data that can be used to identify, contact, or locate an individual or, in the case of identity theft, to impersonate them.

Protected Health Information (PHI)
Payment Card Industry Data Security Standard (PCI DSS)
Personally Identifiable Information (PII)
Top Secret

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide special publication SP800-61 identifies several stages in an incident response lifecycle. Which stage is determining whether an incident has taken place and assessing how severe it might be, followed by notification of the incident to stakeholders?

Post-incident Activity
Preparation
Detection and Analysis
Containment, Eradication, and Recovery

A

Detection and Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows is commercial software, meaning it must be paid for. A condition of installing Windows is accepting the End User License Agreement (EULA). Microsoft requires you to activate Windows when you install it, which helps them to verify that you are not breaking the terms of the license. What license would be used for personal use and may be transferred between computers but may only be installed on one computer at any one time?

Retail
Original Equipment Manufacturer (OEM)
Volume
Server

A

Retail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Once a system has been cleaned then the appropriate steps need to be taken to prevent re-infection. What is it called when the Anti-Virus (A-V) software intercepts an Operating System (OS) call to open a file and scans the file before allowing or preventing it from being opened?

Configuring On-access Scanning
Configuring Scheduled Scans
DNS Configuration
Software Firewalls

A

Configuring On-access Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Document classification restricts who may see the document’s contents. Classification is generally divided into several levels, following military usage. What level restricts viewing to the owner organization or to third parties under a Non-disclosure Agreement (NDA)?

Unclassified
Classified
Confidential
Secret

A

Classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Linux command searches through files or filters?

A

grep

17
Q

What Windows command displays group policy results for the user?

A

gpresult

18
Q

There are several different types of viruses, and they are generally classified by the different ways they can infect the computer. Which type of virus affects Office documents by using the programming code that underpins macro functionality maliciously?

Boot sector viruses
Firmware viruses
Script viruses
Macro viruses

A

Macro viruses

19
Q

What type of security software is designed to monitor the permissions allocated to apps and how they are using (or abusing) them?

Firewall Apps
Anti-virus Apps
App Scanner
Patches

A

App Scanner

20
Q

What actions may a technician utilize when troubleshooting a problematic mobile device? (Select all that apply.)

Close running apps

Uninstall apps

Try a soft reset

Perform a factory default reset

A

Close running apps
Uninstall apps
Try a soft reset
Perform a factory default reset

21
Q

What type of Trojan is a set of tools designed to gain control of a computer without revealing its presence?

Ransomware
Rootkits
Spyware
Rogueware

A

Rootkits

22
Q

What is the second step that CompTIA has identified as best practice for malware removal?

Schedule scans and run updates.
Identify and research malware symptoms.
Quarantine infected systems.
Remediate infected systems.

A

Quarantine infected systems.

23
Q

How is a website and program code made trustworthy by proving the site or code author’s identity?

Certificate Authority (CA)
Root Certificates
Digital Certificate
Public Key

A

Digital Certificate