Chapter 23 ■ Securing Operating Systems Flashcards
1
Q
- Which policy would you create to define the minimum specification if an employee wanted
to use their own device for email?
A. MDM
B. AUP
C. BYOD
D. NDA
A
C. BYOD
2
Q
- Which term refers to copying data between a mobile device and a computer system in order
to mirror such things as contacts, programs, pictures, and music?
A. Calibration
B. Remote wipe
C. Pairing
D. Synchronization
A
D. Synchronization
3
Q
- You want to follow the rules of good security administration as set by CompTIA and vendors.
To do so, which account should be disabled on most Windows operating systems for
security reasons?
A. Guest
B. Print Operators
C. Power Users
D. Userone
A
A. Guest
4
Q
- What kind of mobile app is being used when the owner’s phone displays a message on the
screen and emits an extremely loud tone?
A. Failed login restriction
B. Antivirus
C. Locator
D. Remote wipe
A
C. Locator
5
Q
- As a best practice, after a set period of inactivity on a Windows workstation, what should
happen?
A. The system should shut down.
B. The system should restart.
C. A password-enabled screensaver should automatically start.
D. The system should log out the user.
A
C. A password-enabled screensaver should automatically start.
6
Q
- A new app developed for the Android platform has which extension?
A. .sdk
B. .apk
C. .ipa
D. .exe
A
B. .apk
7
Q
- Which of the following has the goal of allowing a username/password combination to be
entered once, and then allowing claims to be used for consecutive logins? (Choose the best
answer.)
A. Tokens
B. Kerberos
C. Single sign-on
D. Multifactor authentication
A
C. Single sign-on
8
Q
- Which of the following passwords is a secure password? (Choose the best answer.)
A. serverpassword0ne
B. $erVer1
C. *erverP%ssw#rd
D. serverpassword1
A
C. *erverP%ssw#rd
9
Q
- What should be implemented to mitigate the risk of a password from being shoulder surfed
or keylogged?
A. Antivirus
B. Privacy screens
C. Password complexity
D. Password expiration
A
D. Password expiration
10
Q
- What is a best practice for mitigating the risk of a contractor account that is forgotten
about? (Choose the best answer.)
A. Time restrictions
B. Password complexity
C. Account expiration
D. Password expiration
A
C. Account expiration
11
Q
- Your boss is concerned that USB drives could infect the workstation. What can you do to
mitigate this risk?
A. Install current updates to the operating system.
B. Disable autorun for all media.
C. Enable BitLocker.
D. Enable BitLocker to Go.
A
B. Disable autorun for all media.
12
Q
- What is normally performed when an employee is offboarded?
A. Their user account is deleted.
B. Their user account is unlocked.
C. Their user account is created.
D. Their user account’s password is reset.
A
A. Their user account is deleted.
13
Q
- By default, when setting up an Android device, what is the relevance to the Google account
required?
A. The device requires email setup.
B. The account is used for cloud synchronizations.
C. The account is used for desktop backups.
D. The device requires registration.
A
B. The account is used for cloud synchronizations.
14
Q
- You need to secure your mobile device’s lock screen with the highest level of protection.
Which of the following should you use? (Choose the best answer.)
A. Fingerprint lock
B. Face lock
C. Passcode lock
D. Swipe lock
A
A. Fingerprint lock
15
Q
- You need to encrypt a single file on a Windows Desktop. Which technology should you use?
A. EFS
B. BitLocker
C. NTFS
D. BitLocker to Go
A
A. EFS