Security+ Questions Flashcards

1
Q

A periodic update that corrects problems in one version of a product is called a(n) _________.

A

Service Pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which device monitors network traffic in a passive manner? 
A. Sniffer
B. IDS
C. Firewall
D. Web Browser
A

B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a system that is intended or designed to be broken into by an attacker?
A. Honeypot
B. Honeybucket
C. Decoy
D. Spoofing system
E. Deleted if the employee has been terminated

A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
In intrusion detection system vernacular, which account is responsible for setting the security policy for an organization?
A. Supervisor
B. Administrator
C. Root
D. Director
A

B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
You are a junior security administrator for a large bank. You have been asked to make the database servers as secure as they can be. The process of making certain that an entity (operating system, application, and so on) is as secure as it can be is known as which of the following?
A. Stabilizing
B. Reinforcing
C. Hardening
D. Toughening
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

John is working on designing a network for the insurance company where he is employed. He wants to put the web server in an area that has somewhat less security so that other users might access it. But he does not want that to compromise the security of the rest of the network. what would be John’s best approach?
A. Place the web server in a honeynet.
B. Place the web server on the guest network segment,
C. Place the web server in a DMZ.
D. Place the web server outside his network.

A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Tom has been instructed to find a security standard, applicable to the United States, that will help him develop appropriate security policies. He has found a standard that describes 8 principles and 14 practices that can be used to develop security policies. What standard is Tom most likely reviewing?
A. ISO/IEC 27001:2013
B. NIST 800-12
C. NIST 800-14
D. ISA/IEC-62443 4
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Juanita is implementing a security mechanism that will fully encrypt the hard drive of laptops in her organization. The encryption and decryption will be automatic. What best describes what Juanita is implementing?
A. AES
B. TPM
C. FDE
D. SED
A

D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ahmed has been working to mitigate the threat of malware in his network. He has selected a specific vendor (Vendor ABC) for his antivirus software. He is using ABC products everywhere he needs antivirus software. Is this the correct decision? Why or why not?
A. Yes, consistency is more secure.
B. Yes, this will make the process more affordable.
C. No, this violates control diversity.
D. No, this violates vendor diversity.

A

D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
You are concerned about your backup files becoming infected with malware. Which of the following technologies would be best to protect your backup?
A. Air-gap
B. SPI firewall
C. DMZ
D. VLAN
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following devices is the most capable of providing infrastructure security?
A. Hub
B. Switch
C. Router
D. Modem
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Upper management has decreed that a firewall must be put in place immediately, before you site suffers an attack that struck a sister company. Responding to this order, your boss instructs you to implement a packet filter by the end of the week. A packet filter performs which functions?
A. Prevents unauthorized packets from entering the network
B. Allows all packets to leave the network
C. Allows all packets to enter the network
D. Eliminates collisions in the network

A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which device stores information about destinations in a network (choose the best answer)?
A. Hub
B. Modem
C. Firewall
D. Router
A

D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
As more and more clients have been added to your network, the efficiency of the network has decreased significantly. You're preparing a budget for next year, and you specifically want to address this problem. Which of the following devices acts primarily as a tool to improve network efficiency?
A. Hub
B. Switch
C. Router
D. PBX
A

B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
You've been notified that you'll soon be transferred to another site. Before you leave, you're to audit the network and document everything in use and the reason why it's in use. The next administrator will use this documentation to keep the network running. Which of the following protocols isn't a tunneling protocol but is probably used at your site by tunneling protocols for network security?
A. IPSec
B. PPTP
C. L2TP
D. L2F
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following can be implemented as a software or hardware solution and is usually associated with a device--a router, a firewall, NAT, and so on--used to shift a load from one device to another?
A. Proxy
B. Hub
C. Load Balancer
D. Switch
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following are multiport devices that improve network efficiency?
A. Switches
B. Modems
C. Gateways
D. Concentrators
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Which IDS system uses algorithms to analyze the traffic passing through the network?
A. Arithmetical
B. Algebraic
C. Statistical
D. Heuristic
A

D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which of the following can be used to offload the public-key encryption to a separate hardware plug-in card?
A. SSL Accelerator
B. Load Balancer
C. Proxy Firewall
D. SIEM
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which of the following protections implies that information, once written, cannot be modified?
A. DLP
B. ROM
C. WORM
D. NAC
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
In which two modes can IPSec work?
A. Tunneling and Storing
B. Transport and Storing
C. Tunneling and Transport
D. At-Rest and At-Ease
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
With which tunnel configuration are only some (usually all incoming) requests routed and encrypted over the VPN?
A. Split
B. Full
C. Partial
D. Hybrid
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
With which type of load balance scheduling is the first client request sent to the first group of servers, the second is sent to the second, and so on?
A. Affinity
B. Round-robin
C. Sequential
D. Progressive
A

B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which type of load balancing configuration means that more than one load balancing server is working at all times to handle the load/requests as they come in?
A. Active-active
B. Cooperative-sharing
C. Equal Partner
D. Proactive-colleague
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
Which of the following work by decrypting encrypted traffic (SSL or TLS), inspecting it, and then re-encrypting it before sending it on to its destination?
A. SSL filteres
B. SSL gateways
C. SSL accelerators
D. SSL decryptors
A

D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Which of the following is a chip that can store cryptographic keys, passwords, or certificates?
A. HMP
B. TPM
C. MTP
D. PMH
A

B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which AP-based technology can increase security dramatically by allowing or denying access based on a client's physical address?
A. MAC filtering
B. UTM (unified threat management)
C. Round-robin
D. WORM
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
Which network devices are used to divide larger networks into smaller sections by sitting between two physical network segments and managing the flow of data between the two?
A. Accelerators
B. Proxies
C. Bridges
D. Balancers
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
Which problem can occur when more than one bridge or switch is implemented on the network, and the devices confuse each other by leading one another to believe that a host is located on a certain segment when it is not?
A. Backdoors
B. Dead zones
C. Collisions
D. Loops
A

D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
Which of the following technologies is designed to combat loops created by switches and bridges and enables bridge/switch interfaces to be assigned a value that is then used to control the learning process and prevent problems?
A. ESSID
B. SSID
C. BRD
D. STP
A

D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

John is a network administrator for ACME company. He is trying to explain least privileges to a new technician. Which of the following is the basic premise of lest privilege?
A. Always assign responsibilities to the administrator who has the minimum permissions required.
B. When assigning permissions, give users only the permissions they need to do their work and no more.
C. Regularly review user permissions and take away one that they currently have to see if they will complain or even notice that it is missing.
D. Do not give management more permissions than users.

A

B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
The present method of requiring access to be strictly defined on every object is proving too cumbersome for your environment. The edict has come down from upper management that access requirements should be slightly reduced. Which access model allows users some flexibility for information-sharing purposes?
A. DAC
B. MAC
C. RBAC
D. MLAC
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Ahmed has been directed to ensure that LDAP on his network is secure. LDAP is an example of which of the following?
A. Directory access protocol
B. IDS
C. Tiered model application development environment
D. File server

A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
Upper management has suddenly become concerned about security. As the senior network administrator, you are asked to suggest changes that should be implemented. Which of the following access methods should you recommend if the technique to be used is one that is primarily based on preestablished access and can't be changed by users?
A. MAC
B. DAC
C. RBAC
D. Kerberos
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
Your office administrator is being trained to perform server backups. Which access control method would be ideal for this situation?
A. MAC
B. DAC
C. RBAC
D. Security Tokens
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
You've been assigned to mentor a junior administrator and bring her up to speed quickly. The topic you're currently explaining is authentication. Which uses a KDC to accomplish authentication for users, programs, or systems?
A. CHAP
B. Kerberos
C. Biometrics
D. Smartcards
A

B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
After a careful risk analysis, the value of your company's data has been increased. Accordingly, you're expected to implement authentication solutions that reflect the increased value of the data. Which of the following authentication methods uses more than one authentication process for a logon?
A. Multifactor
B. Biometrics
C. Smartcard
D. Kerberos
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Your company provides medical data to doctors from a worldwide database. Because of the sensitive nature of the data, it's imperative that authentication be established on each session and be valid only for that session. Which of the following authentication methods provides credentials that are valid during a single session?
A. Tokens
B. Certificate
C. Smartcard
D. Kerberos
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Which of the following is the term used whenever two or more parties authenticate each other?
A. SSO
B. Multifactor authentication
C. Mutual authentication
D. Tunneling
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
You have added a new child domain to your network. As a result of this, the child has adopted all o the trust relationships with other domains in the forest that excited for its parent domain. What is responsible or this?
A. LDAP access
B. XML access
C. Fuzzing access
D. Transitive access
A

D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
Which of the following is a type of smartcard issued by the Department of Defense as a general identification/authentication card for military personnel, contractors, and non-DoD employees?
A. PIV
B. POV
C. DLP
D. CAC
A

D.

42
Q
You are working as a security administrator for a small financial institution. You want to use an authentication method that will periodically reauthenticate clients. Which protocol is best suited for this?
A. PAP
B. SPAP
C. KERBEROS
D. CHAP
A

D.

43
Q
John is trying to determine the origin of an email. He has captured the email headers and knows the IP address of the originating email server. What command would show John the complete path to that IP address?
A. ping -a
B. arp
C. tracert
D. nslookup
A

C.

44
Q

Juanita is the security administrator for a large university. She is concerned about copyright issues and wants to ensure that her university does not violate copyrights. What would be her main concern regarding unauthorized software?
A. It might be copyrighted.
B. It might be used to circumvent copyright protection.
C. That should not be a copyright concern.
D. It is not a concern if she has at least one license for the software.

A

A.

45
Q
Terrance is examining an authentication system that was developed at MIT and uses tickets for authentication. What system is Terrance most likely examining?
A. CHAP
B. MS-CHAP
C. KERBEROS
D. OATH
A

C.

46
Q
Melissa is planning on implementing biometric authentication on her network. Which of the following should be a goal for any biometric solution she selects?
A. High FRR, low FAR
B. HIGH FAR, low FRR
C. Low CER
D. High CER
A

C.

47
Q
Jarod is evaluating web-based, single sign-on solutions. Which of the following technologies is most associated with web page authorization?
A. SAML
B. PIV
C. CHAP 
D. RBAC
A

A.

48
Q
You are a network administrator for ACME Corporation. You want to implement a new access control mechanism. The mechanism you are considering takes into account the entire environment/scenario of the access request. What does this describe?
A. MAC
B. DAC
C. RBAC
D. ABAC
A

D.

49
Q
Dennis has implemented an authentication system that uses a password, a PIN, and the user's birthday. What best describes this system?
A. Single factor
B. Two factor
C. Three factor
D. Strong authentication
A

A.

50
Q
An IV attack is usually associated with which of the following wireless protocols?
A. WEP
B. WAP
C. WPA
D. WPA2
A

A.

51
Q
What is the size of the initialization vector (IV) that WEP uses for encryption?
A. 6-bit
B. 24-bit
C. 56-bit
D. 128-bit
A

B.

52
Q
What is the size of the wrapper TKIP places around the WEP encryption with a key that is based on things such as the MAC address of your machine and the serial number of the packet?
A. 128-bit
B. 64-bit
C. 56-bit
D. 12-bit
A

A.

53
Q
What technology is used to send data between phones that are in close proximity to each other?
A. NFC
B. IBI
C. IBJ
D. INFC
A

A.

54
Q
What technology is used to simplify network setup by allowing a router to have the administrator push a button on it to allow a new host to join?
A. WEP
B. WPA
C. WTLS
D. WPS
A

D.

55
Q
Which of the following technologies is used to identify and track tags attached to objects?
A. NFC
B. RFID
C. IV
D. DSC
A

B.

56
Q
What type of attack captures portions of a session to play back later to convince a host that it is still talking to the original connection?
A. Replay
B. Echo
C. Duplication
D. Reprise
A

A.

57
Q
Which standard defines port-based security for wireless network access control?
A. 802.1n
B. 802.1g
C. 802.1x
D. 802.1s
A

C.

58
Q
Which of the following types of attacks involves the sending of unsolicited messages over a Bluetooth connection?
A. Bluesmurfing
B. Bluesnarfing
C. Bluewhaling
D. Bluejacking
A

D.

59
Q
Karl has checked into a hotel after a long day of travel. He is attempting to check his daily deluge of email messages using the free in-room Wi-Fi, but it keeps losing the connection. When he calls the front deck, they suggest that he might want to use the premium Wi-Fi (which costs more) to get a better connection. What type of attack could this scenario represent?
A. Upselling
B. Cross-selling
C. Dissociation
D. Imitation
A

C.

60
Q
Frustrated with the low signal that the devices in his cubicle receive, Spencer brings in his own access point and creates his own network, Kristin, a co-worker, tells him that if the boss finds out about this it is grounds for immediate dismissal, and he should read the employee handbook if he has any questions. Setting up your own access point represents which of the following?
A. Degenerate
B. Rogue
C. Corporeal
D. Temporal
A

B.

61
Q
During the authentication part of setting up his small office access point, Wolfgang was required to enter a PIN within 60 seconds. This process is known as:
A. Wired Equivalent Privacy
B. Wi-Fi Protected Access
B. Wi-Fi Protected Setup
D. Wi-Fi Authentication Protocol
A

C.

62
Q
Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired network?
A. WEP
B. WEB
C. WELL
D. WALL
A

A.

63
Q
Evan fears that the tenant in the office next door is using RF interference to try to force his small company to vacate the building in frustration. Purposely obstructing or interfering with a signal is known as which of the following?
A. Shoving
B. Jamming
C. Cramming
D. Blocking
A

B.

64
Q
What is a disassociation attack more commonly known as?
A. Decertification attack
B. Disconfirmation attack
C. Deauthentication attack
D. Denial attack
A

C.

65
Q
With near field communication (NFC) technology, the industry tends to use what distance as "near?"
A. 1 inch
B. 1.2 inches
C. 1.6 inches
D. 2 inches
A

C.

66
Q
With Bluetooth devices suddenly popping up everywhere in your network, you want to secure as many of them as possible. One of the simplest methods of securing these devices is not to set their attribute to:
A. Discoverable
B. Transmit
C. Announce
D. Communicate
A

A.

67
Q
Which of the following is the gaining of unauthorized access through a Bluetooth connection?
A. Bluejumping
B. Bluesnarfing
C. Bluerunning
D. Bluelining
A

B.

68
Q
A client calls you and says that he wants to turn off SSID broadcast on his small network because he is afraid that those simply scanning for a network are finding it and trying to connect to it. You inform him that this a very weak form of security and suggest some other options, be he is insistent on this being done. What is this form of hiding the router known as?
A. Veiling
B. Masking
C. Shrouding
D. Cloaking
A

D.

69
Q
Which of the following is an attack in which a rogue access point poses as a legitimate wireless service provider to intercept communication that uses transmit?
A. Collision
B. Evil Twin
C. NFC
D. WPS
A

B.

70
Q
In which cloud service model can the consumer "provision" and "deploy and run"?
A. SaaS
B. PaaS
C. IaaS
D. CaaS
A

C.

71
Q
Which cloud delivery model is implemented by a single organization, enabling it to be implemented behind a firewall?
A. Private
B. Public
C. Community
D. Hybrid
A

A.

72
Q
Which cloud service model provides the consumer with the infrastructure to create applications and host them?
A. SaaS
B. PaaS
C. IaaS
D. CaaS
A

B.

73
Q
Which cloud delivery model could be considered a pool of services and resources delivered across the Internet by a cloud provider?
A. Private
B. Public
C. Community
D. Hybrid
A

B.

74
Q
Which cloud service model gives the consumer the ability to use applications provided by the cloud provided over the Internet?
A. SaaS
B. PaaS
C. IaaS
D. CaaS
A

A.

75
Q
Which cloud delivery model has infrastructure shared by several organizations with shared interests and common IT needs?
A. Private
B. Public
C. Community
D. Hybrid
A

C.

76
Q
Which cloud delivery model could be considered an amalgamation of other types of delivery models?
A. Private
B. Public
C. Community
D. Hybrid
A

D.

77
Q
With which of the following subscription-based models is security more cost effective than individuals or smaller corporations could ever get on their own?
A. SECaaS
B. PaaS
C. XaaS
D. WaaS
A

A.

78
Q
Which of the following are on-premise or cloud-based security policy enforcement points?
A. Feature slugs
B. Flood guards
C. VDI/VDEs
D. Cloud access security brokers
A

D.

79
Q
Which feature of cloud computing involves dynamically provisioning (or deprovisioning) resources as needed?
A. Multitenancy
B. Elasticity
C. CMDB
D. Sandboxing
A

B.

80
Q
What is the term for restricting an application to a safe/restricted resource area?
A. Multitenancy
B. Fencing
C. Securing
D. Sandboxing
A

D.

81
Q
Which of the following terms implies hosting data from more than one consumer on the same equipment?
A. Multitenancy
B. Duplexing
C. Bastioning
D. Fashioning
A

A.

82
Q

When going with a public cloud delivery model, who is accountable for the security and privacy of the outsourced service?
A. The cloud provider and the organization
B. The cloud provider
C. The organization
D. No one

A

C.

83
Q
When your company purchased a virtual datacenter provider, you inherited a mess. The employees working there had to respond regularly to requests to create virtual machines without the disciplines and controls normally found in the physical world. This resulted in machines being over-provisioned (too much CPU, memory, or disk) and consuming resources long after they were no longer required. What type of problem is this?
A. VM escape
B. VM digress
C. VM sprawl
D. VM Type I
A

C.

84
Q
Although a hybrid cloud could be any mixture of cloud delivery models, it is usually a combination of which of the following?
A. Public and community
B. Public and private
C. Private and community
D. Two or more communities
A

B.

85
Q
Which type of hypervisor implementation is known as "bare metal"?
A. Type I
B. Type II
C. Type III
D. Type IV
A

A.

86
Q
Which type of hypervisor implementation is known as "hosted"?
A. Type I
B. Type II
C. Type III
D. Type IV
A

B.

87
Q
When your servers become too busy, you can offload traffic to resources from a cloud provider. This is known as which of the following?
A. Latency
B. Cloud bursting
C. Multitenancy
D. Peaking
A

B.

88
Q
What protocol is used by technologies for load balancing/prioritizing traffic?
A. ESX
B. QoS
C. IBJ
D. IFNC
A

B.

89
Q
What is the machine on which virtualization software is running known as?
A. Node
B. Workstation
C. Host
D. Server
A

C.

90
Q
Which of the following terms refers to the process of establishing a standard for security?
A. Baselining
B. Security Evaluation
C. Hardening
D. Methods research
A

A.

91
Q
You've been chosen to lead a team of administrators in an attempt to increase security. You're currently creating an outline of all the aspects of security that will need to be examined and acted on. Which of the following terms describes the process of improving security in a network operating system (NOS)?
A. Common criteria
B. Hardening
C. Encryption
D. Networking
A

B.

92
Q
John is responsible for application security at his company. He is concerned that the application reacts appropriately to an unexpected input. What type of testing would be most helpful to him?
A. Unit testing
B. Integration testing
C. Stress testing
D. Fuzzing
A

D.

93
Q
Myra is concerned about database security. She wants to begin with a good configuration of the database. Which of the following is a fundamental issue with database configuration?
A. Normalization
B. Input Validation
C. Fuzz testing
D. Stress testing
A

B.

94
Q
Which of the following is the technique of providing unexpected values as input to an application to try to make it crash?
A. DLP
B. Fuzzing
C. Stress testing
D. HSM
A

B.

95
Q
Mary is responsible for website security in her company. She wants to address widely known and documented web application vulnerabilities. Which resource would be most helpful?
A. OWASP
B. CERT
C. NIST
D. ISO
A

A.

96
Q
You're redesigning your network in preparation for putting the company up for sale. The network, like all aspects of the company, needs to perform at its best in order to benefit the sale. Which model is used to provide an intermediary server between the end user and the database?
A. One-tiered
B. Two-tiered
C. Three-tiered
D. Relational Database
A

B.

97
Q
The administrator at MTS was recently fired, and it has come to light that he didn't install updates and fixes as they were released. As the newly hired administrator, your first priority is to bring all networked clients and servers up to date. What is a bundle of one or more system fixes in a single product called?
A. Service pack
B. Hotfix
C. Patch
D. System install
A

A.

98
Q
Your company does electronic monitoring of individuals under house arrest around the world. Because of the sensitive nature of the business, you can't afford any unnecessary downtime. What is the process of applying a repair to an operating system while the system stays in operation?
A. Upgrading
B. Service pack installation
C. Hotfix
D. File update
A

C.

99
Q
Juan has just made a minor change to the company's e-commerce application. The change works as expected. What type of testing is most important for him to perform?
A. Unit testing
B. Regression testing
C. Static testing
D. Stress testing
A

B.

100
Q
Your company has grown at a tremendous rate, and the need to hire specialists in various IT areas has become apparent. You're helping to write an online advertisement that will be used to recruit new employees, and you want to make certain that applicants possess the necessary skills. One knowledge area in which your organization is weak is database intelligence. What is the primary type of database used in applications today that you can mention in the ads?
A. Hierarchical
B. Relational
C. Network
D. Archival
A

B.

101
Q
What is the process of applying manual changes to a program called?
A. Hotfix
B. Service pack
C. Patching
D. Replacement
A

C.

102
Q
You want to assign privileges to a user so that she can delete a file but not be able to assign privileges to others. What permissions should you assign?
A. Full control
B. Delete
C. Administrator
D. Modify
A

B.