Chapter 23 ■ Securing Operating Systems Flashcards

1
Q
  1. Which policy would you create to define the minimum specification if an employee wanted
    to use their own device for email?
    A. MDM
    B. AUP
    C. BYOD
    D. NDA
A

C. BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which term refers to copying data between a mobile device and a computer system in order
    to mirror such things as contacts, programs, pictures, and music?
    A. Calibration
    B. Remote wipe
    C. Pairing
    D. Synchronization
A

D. Synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. You want to follow the rules of good security administration as set by CompTIA and vendors.
    To do so, which account should be disabled on most Windows operating systems for
    security reasons?
    A. Guest
    B. Print Operators
    C. Power Users
    D. Userone
A

A. Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What kind of mobile app is being used when the owner’s phone displays a message on the
    screen and emits an extremely loud tone?
    A. Failed login restriction
    B. Antivirus
    C. Locator
    D. Remote wipe
A

C. Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. As a best practice, after a set period of inactivity on a Windows workstation, what should
    happen?
    A. The system should shut down.
    B. The system should restart.
    C. A password-enabled screensaver should automatically start.
    D. The system should log out the user.
A

C. A password-enabled screensaver should automatically start.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A new app developed for the Android platform has which extension?
    A. .sdk
    B. .apk
    C. .ipa
    D. .exe
A

B. .apk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following has the goal of allowing a username/password combination to be
    entered once, and then allowing claims to be used for consecutive logins? (Choose the best
    answer.)
    A. Tokens
    B. Kerberos
    C. Single sign-on
    D. Multifactor authentication
A

C. Single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following passwords is a secure password? (Choose the best answer.)
    A. serverpassword0ne
    B. $erVer1
    C. *erverP%ssw#rd
    D. serverpassword1
A

C. *erverP%ssw#rd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What should be implemented to mitigate the risk of a password from being shoulder surfed
    or keylogged?
    A. Antivirus
    B. Privacy screens
    C. Password complexity
    D. Password expiration
A

D. Password expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is a best practice for mitigating the risk of a contractor account that is forgotten
    about? (Choose the best answer.)
    A. Time restrictions
    B. Password complexity
    C. Account expiration
    D. Password expiration
A

C. Account expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Your boss is concerned that USB drives could infect the workstation. What can you do to
    mitigate this risk?
    A. Install current updates to the operating system.
    B. Disable autorun for all media.
    C. Enable BitLocker.
    D. Enable BitLocker to Go.
A

B. Disable autorun for all media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What is normally performed when an employee is offboarded?
    A. Their user account is deleted.
    B. Their user account is unlocked.
    C. Their user account is created.
    D. Their user account’s password is reset.
A

A. Their user account is deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. By default, when setting up an Android device, what is the relevance to the Google account
    required?
    A. The device requires email setup.
    B. The account is used for cloud synchronizations.
    C. The account is used for desktop backups.
    D. The device requires registration.
A

B. The account is used for cloud synchronizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. You need to secure your mobile device’s lock screen with the highest level of protection.
    Which of the following should you use? (Choose the best answer.)
    A. Fingerprint lock
    B. Face lock
    C. Passcode lock
    D. Swipe lock
A

A. Fingerprint lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. You need to encrypt a single file on a Windows Desktop. Which technology should you use?
    A. EFS
    B. BitLocker
    C. NTFS
    D. BitLocker to Go
A

A. EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A user is in both the Sales group and the Marketing group. The Sales group has full permission
    at the share level, and the Marketing group has read-only permissions. The files on
    NTFS are secured with the Modify permission for the Sales group and the Read & Execute
    permission for the Marketing group. Which permissions with the user have?
    A. Full
    B. Modify
    C. Read-only
    D. Read & Execute
A

B. Modify

17
Q
  1. James just moved a folder on the same partition. What will happen with the permissions for
    the folder?
    A. The permissions will be the same as they were before the move.
    B. The permissions will be inherited from the new parent folder.
    C. The permissions will be configured as the root folder for the drive letter.
    D. The permissions will be blank until configured.
A

A. The permissions will be the same as they were before the move.

18
Q
  1. A user is in the Sales group. The Sales group has no permissions at the share level. The files
    on NTFS are secured with the Modify permission for the Sales group. What permissions
    with the user have?
    A. The user will have the Modify permission when connecting from the network.
    B. The user will have the Modify permission when logged in locally to the computer.
    C. The user will have no access when logged in locally to the computer.
    D. The user will have read-only permissions when connecting from the network
A

B. The user will have the Modify permission when logged in locally to the computer.

19
Q
  1. You are trying to delete a file on the local filesystem, but the operating system will not let
    you. What could be the problem? (Choose the best answer.)
    A. The NTFS Modify permission is applied to the file.
    B. The share permissions are not set to Full Control.
    C. The file attributes are set to Read-only.
    D. The file attributes are set to System.
A

C. The file attributes are set to Read-only.

20
Q
  1. You need to enforce profile security requirements on mobile devices. Which should you use
    to achieve this goal?
    A. AUP
    B. NDA
    C. BYOD
    D. MDM
A

D. MDM