Security (2) Flashcards
You need to run a command from the Windows command line as administrator. Which of the following methods will enable you to do this?
Enter your user name and account when prompted
Open the command prompt as sudo
Right-click cmd.exe and select Run as administrator
Right-click cmd.exe and select Run as administrator
To run command prompt commands as administrator, you must open the command prompt session as administrator
A folder is configured with Full Control settings. However, there’s a file in that folder that you want to make read-only. Which of the following would work?
Change the security setting for the file to Read-only
Move the file to a different folder at the same level as the current folder and set the folder as Read-only
Use attrib
Move the file to a different folder at the same level as the current folder and set the folder as Read-only
The parent folder permissions override the settings for a specific file in the folder
You want to view a file in a folder. Which of the following permissions is needed?
List Folder Contents
Modify
Read & Execute
List Folder Contents
List Folder Contents will allow you to view the files in the folder
ou have a SOHO workgroup at home but connect to a domain controller at the office. Your spouse wants to access a shared folder on your computer. Which of the following do you need to do?
Send a request to the domain administrator
Run BitLocker
Set up an account for your spouse on your computer
Set up an account for your spouse on your computer
You control sharing on your workgroup, so you can make these changes
Your computer is called \MyPC. Your spouse’s computer is called \TheOtherPC. To log in to the administrative share on your spouse’s C: drive, which of the following is the correct syntax?
\TheOtherPC$C
\TheOtherPC\DriveC$
\TheOtherPC\C$
\TheOtherPC\C$
The correct syntax includes the remote computer name and the administrative share name
You are considering using one of the following eight-character passwords. Which is the strongest password?
12345678
1Z$#7j!~
867530900
1Z$#7j!~
The strongest passwords use a mixture of upper- and lower-case letters, numbers, and symbols without recognized words
Your client is being plagued by a series of brute-force logon attacks. Which of the following group policy settings would best help stop them?
Account Lockout Policy
Security Options
Password Policy
Account Lockout Policy
The Account Lockout Policy prevents login attempts after a specified number of incorrect logins
A user in your department is going on leave for six months. You don’t want this user to have access to network resources while on leave. What should you do with their account?
Delete it
Take no action
Disable it
Disable it
Disabling an Active Directory account prevents logins by that user while not disrupting security or other settings involving that user
Your department was recently attacked by malware that was automatically loaded from a consultant’s USB drive when it was inserted for diagnostic purposes. Which of the following needs to be disabled?
AutoRun
Explorer
AutoPlay
AutoPlay
AutoPlay is the feature that opens an app or lists a choice of apps based on the contents of the removable media
Some of the computers in the organization need to use BitLocker. Which of the following is the correct path in group policy to configure BitLocker settings?
User Configuration | Administrative Templates | Control Panel | BitLocker Drive Encryption
Computer Configuration | Administrative Templates | Windows Components | BitLocker Drive Encryption
Computer Configuration | Administrative Templates | Windows Components | BitLocker Policies
Computer Configuration | Administrative Templates | Windows Components | BitLocker Drive Encryption
BitLocker Drive Encryption is a Windows component
An Android phone with confidential company information was lost. The information on the phone began to be used for attacks on company resources, although the user had set up a passcode. Which of the following Android settings could have prevented attacks using the information in the phone? (Choose all that apply.)
Remote wipe
Firewall
Device encryption
BYOD
Remote wipe
Device encryption
Remote wipe could wipe out the device’s contents after it was determined to be lost or stolen; device encryption (a manual process on many devices) could prevent the device’s contents from being accessed
Your company policy for mobile devices prohibits the use of untrusted software sources. Which of the following sources would be prohibited?
App store
Freeware website
Vendor-supplied utilities
Freeware website
Freeware websites might have software that has been compromised with hidden malware
You receive a message on your smartphone that someone is attempting to log in to your e-mail from an unrecognized device. You are asked to approve or deny it. This is an example of which type of security mechanism?
Multifactor authentication
Trusted source
Single-factor authentication
Multifactor authentication
Multifactor authentication is being used because an additional confirmation beyond user name/password is needed to permit access
Your client is very forgetful, and while away from home is trying to log in to her iPhone. The client has tried eight times already to log in and is frustrated because it takes longer between login attempts each time. What should you advise her to do?
Keep trying to log in
Stop trying until she can get back home and check to see if she has the information available there
Use a hacking tool
Stop trying until she can get back home and check to see if she has the information available there
If the option to wipe data after ten unsuccessful logins has been enabled in Settings | Passcode, the user is very close to losing her data
You are part of a team developing a BYOD policy for smartphone usage. Which of the following topics are most likely to be part of the policy? (Choose two.)
Approved case colors
Company reimbursement for mobile service charges
Ownership of charging cables
Ownership of data stored on device
Company reimbursement for mobile service charges
Ownership of data stored on device
Deciding who pays for mobile service and who owns the data on a BYOD device are typical issues in a BYOD policy