Quiz 12 Flashcards

1
Q

______ maintains a controlled environment. They have strict control over what apps can be installed, and they reserve the right to refuse any app that doesn’t measure up. This is called a ______ system

A

Apple, Closed source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ can be considered the opposite of Apple. Manufacturers can customize the OS as they see fit and apps are availableto purchase and download through various app stores. This is called an ____ system

A

Android, Open source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _____ protects an internal network from unauthorized access to and from the Internet by hiding addresses and blocking ports`

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Current laptops typically use what kind of RAM?

A

204 pin DDR3 SO-DIMM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most laptops today have either ______ or M.2 expansion slots for internal cards such as wireless NICs

A

Mini-PCIe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What mobile device feature allows a user to rotate a tablet and have the screen rotate with the device?

A

Accelerometer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A room that requires one door to be closed in order to access a second door (mantrap) is a security measure to prevent against what kind of infiltration?

A

Tailgaiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of technology uses an inherence factor to establish identity?

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the seven steps of the laser printing process?

A

1) Processing
2) Charging
3) Exposing
4) Developing
5) Transferring
6) Fusing
7) Cleaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Laptops can be easily stolen. One of the best ways to protect your laptop from this is to use a _____

A

Cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

After installing a printer, it only prints garbled text. What is the most likely cause of this issue?

A

Incorrect or corrupt print drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of malware takes control of your computer, encrypts your data, and asks for cash to remediate the issue?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of authentication factor is this?

Somewhere you are, which can be pinpointed by GPS

A

Location factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of authentication factor is this?

Something you posses, such as a smart card

A

Ownership factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of authentication factor is this?

Time based factor which may require logging on at a certain time of day

A

Temporal factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of authentication factor is this?

Something the user is or something they do, such as a retinal pattern

A

Inherence factor

17
Q

What type of authentication factor is this?

Something the user knows, such as a username and password

A

Knowledge factor

18
Q

What is the most effective method to protect sensitive data from access if your device is stolen?

A

Remote wipe

19
Q

A type of virus that changes its signature (varied, but operational copies of itself), to prevent detection is called a ______ virus

A

Polymorph

20
Q

What is the most secure W-Fi setting as of today?

A

WPA2

21
Q

A virtual private network creates what through the internet?

A

Tunnel

22
Q

What type of attack takes advantage of human shortcomings to gain access that should otherwise be denied?

A

Social engineering

23
Q

Where is the WiFi antenna typically stored in a laptop

A

Monitor

24
Q

What is the best procedure for malware removal according to 901 exam standards?

A

1) Identify malware symptoms
2) Quarantine infected system
3) Disable system restore (Windows)
4) Remediate infected systems
5) Schedule scans and run updates
6) Enable system restore and create a new restore point (Windows)
7) Educate end user

25
Q

What is a rootkit?

A

A program that takes advantage of very low level operating system functions to hide itself

26
Q

What is a worm?

A

Malware that replicates on its own through hardware or through networks

27
Q

What is a Trojan Horse?

A

Malware that appears to be something beneficial but usually has evil intent

28
Q

What is a Botnet?

A

A network of infected computers under the control of a person or group

29
Q

What is a Virus?

A

Malware that often hides until it can be activated by human action, possibly stealing information

30
Q

What is Ransomware?

A

Encrypts data on a drive and then demands money to decrypt the same data

31
Q

What type of attack involves a hacker changing the MAC address on their computer to that of a server, causing a router to adjust its MAC tables accordingly?

A

Address spoofing

32
Q

What types of printers are referred to as page printers because they receive their print job instructions one page at a time?

A
  • Inkjet

- Laser

33
Q

What malware is similar to a virus, but it can reproduce itself, is self contained, and doesn’t need a host application to be transported?

A

Worm

34
Q

What is the typical screen size for a phablet?

A

5”-7”