A+ 902 Test 17 Flashcards

1
Q

Screensaver password requirement falls into the category of security best practices as it allows to block access of unauthorized persons to a user’s workstation in situations where the user is forced to leave their desk for a short period of time.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of user permission restrictions can be set in BIOS?

A

User password required to proceed when the computer is powered on
Password-restricted access to the BIOS setup utility (Supervisor password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of password provides the highest level of permissions in BIOS?

A

Supervisor password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the account management security measures listed below narrows down a user’s computer access to specified hours?

A

Login time restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following account management options provides a countermeasure against brute-force attacks?

A

Failed logon attempts lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An MS Windows feature enabling automatic execution of code contained on a mounted drive is known as:

A

AutoRun

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the answers listed below refer(s) to Microsoft Windows OS feature(s) that should be disabled due to potential security risks?

A

Guest account

AutoRun

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process of OS hardening involves:

A

Disabling unnecessary services
Patch/update management process
Fixing configuration errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user interface element controlling access to a mobile device after the device is switched on is called:

A

Screen lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following answers lists screen lock types used for securing mobile devices?

A
Fingerprint lock
Face lock
Swipe lock
Passcode lock
->All of the above
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below refers to a security countermeasure that allows to erase data on a lost or stolen mobile device?

A

Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A mobile device’s built-in functionality enabling the usage of locator applications is called:

A

GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ability to use mobile apps from unofficial sites typically requires changing a mobile OS’s security configuration setting that enables downloading and installing apps from unknown sources.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the answers listed below refers to a policy that allows employees to use their own mobile devices on a corporate network?

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?

A

Degaussing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the Windows utilities listed below is used for the purpose of hard drive low-level formatting?

A
CHKDSK
BOOTREC
FORMAT
DISKPART
=>None of the above
17
Q

Disabling SSID broadcast:

A

Makes a WLAN harder to discover

18
Q

Which of the following WAP configuration settings allows for adjusting the boundary range of a wireless signal?

A

Power level controls

19
Q

Which of the tools listed below would be of help in troubleshooting signal loss and low wireless network signal coverage?

A

Heat map

WAP power level controls

20
Q

A solution that simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network is known as:

A

WPS

21
Q

Which of the following wireless technologies are not recommended and should not be used due to their known vulnerabilities?

A

WPS

WEP

22
Q

A network access control method whereby the 48-bit address assigned to each network card is used to determine access to the network is called:

A

MAC filter

23
Q

An IP address assigned permanently to a computer by an Internet Service Provider (ISP) is known as:

A

Static IP address

24
Q

A server with a private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable this function?

A

Port forwarding

25
Q

An application software used to selectively block access to certain websites is an example of:

A

Content filter