A+ 902 Test 16 Flashcards

1
Q

Which of the following functionalities allows a DLP system to fulfil its role?

A

Content inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the acronyms listed below refers to a security solution designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

One of the measures for securing networking devices includes the practice of disabling unused ports.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital security prevention methods include:

A

Antimalware
Email filtering
Directory permissions
Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the best countermeasure against social engineering?

A

User education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A set of rules enforced in a network that restricts the use to which the network may be put is known as:

A

AUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following default local groups has the least amount of access privileges in MS Windows?

A

Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the statements listed below are true?

A

NTFS permissions apply to both network and local users

NTFS permissions can be applied to a folder or individual file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements describing share permissions in MS Windows are true?

A

Apply only to network users

Can be set on a folder level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In NTFS filesystem, the term “Permission propagation” refers to a situation where a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e. folders and files created inside that folder).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In NTFS filesystem, a folder or file copied from one location to another on the same volume retains its original permissions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In NTFS filesystem, a folder or file moved from one location to another on the same volume inherits permissions of its new parent folder.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ATTRIB is a command used to set and remove file attributes in Microsoft Windows operating systems. Available options for this command include: read-only (R), archive (A), system (S), and hidden (H). With ATTRIB, the “+” symbol sets an attribute for a file, the “-“ sign removes the attribute. Which of the answers listed below refers to the correct syntax for applying the read-only attribute to a file?

A

ATTRIB +R [drive:] [path] [filename]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is known as:

A

SSO

17
Q

The “Run as administrator” option in MS Windows allows users with lower-level permissions to perform tasks reserved for system administrators. This feature requires providing Administrator account credentials and temporarily elevates the current user’s privileges to perform a given task. It also simplifies common system tasks, such as for example installation of new software, which would otherwise require logging out and switching to an admin account.

A

True

18
Q

What is the name of a Microsoft Windows feature that allows for encrypting entire drives?

A

BitLocker

19
Q

A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:

A

BitLocker To Go

20
Q

Which of the answers listed below refers to a Windows built-in component that allows for encryption of individual files?

A

Encrypting File System (EFS)

21
Q

Which of the following passwords is the most complex?

A

G$L3tU8wY@z

22
Q

Which of the security settings in MS Windows determines the number of unique new passwords that have to be associated with a user account before an old password can be reused?

A

Password history setting

23
Q

Which of the security policy settings in MS Windows prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?

A

Minimum password age setting

24
Q

Which of the security policy settings listed below prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

A

Maximum password age setting

25
Q

The importance of changing default user names and passwords can be illustrated on the example of certain network devices (such as for example routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.

A

True