test q's Flashcards
- What option can you configure on your workstation to increase security when you leave your desk?
A. File encryption
B. Multifactor authentication
C. Single sign-on
D. Screensaver password
D. Screen Saver password
- Claire, a co-worker, is browsing the Internet and wants to know whether it’s safe to enter her credit card information into a website. What do you tell her to look for?
A. HTTPS
B. HTTP
C. SSL
D. TLS
A. Https
- Which type of software will help protect your computer from malicious network traffic?
A. Software firewall
B. Password complexity tool
C. Antispyware
D. Antivirus
A. Software Firewall
- You have remotely logged into your corporate network. Which of the following is used to ensure encryption of data in transit between your laptop and corporate servers?
A. HTTPS
B. Email encryption
C. VPN
D. Host firewall
C.VPN
When troubleshooting a computer problem, which of the following are steps you can take to identify the problem? (Choose two.)
A. Use external resources such as the Internet.
B. Talk to end users.
C. Isolate the issue.
D. Attribute it to user error.
B. Talk to end users C.Isolate the issue
When providing computer support and testing solutions, what should you always do first?
A. Assume user error.
B. Test the simple stuff.
C. Check Internet resources for solutions.
D. Establish a plan of action
b. Test the simple stuff
Your computer has been running backups for a year. Today, you make a change from backing it up to an external optical drive to backing it up to the cloud. What should you do next?
A. Secure the cloud backup location.
B. Schedule regular cloud backups.
C. Destroy the old optical discs.
D. Verify that the cloud backup works.
Verify that the cloud backup works
You are troubleshooting a computer problem. After testing the solution, what should you do next?
A. Establish a plan of action.
B. Verify functionality.
C. Document the work.
D. Identify the problem.
Establish plan of action
I Eat Tacos Every Veterans Day
What is the last step in the process of troubleshooting a computer?
A. Verify Internet functionality.
B. Document the work.
C. Clean up the mess. 803
D. Retest the solution.
Document
You have been asked to design a backup solution for your manager’s workstation. Which option will be the fastest?
A. Cloud storage
B. Network storage
C. Local storage
D. They are all the same speed.
local storage
You have just installed a new printer on your computer, and while it seems to be recognized by the operating system, it will not print. What is the first source to check for information on the problem?
A. The OS manufacturer’s website
B. The printer manufacturer’s website
C. Google search
D. Internet technical community groups
Printer Manu website
Someone was recently caught sifting through your company’s trash looking for confidential information. What is this an example of?
A. Trash snooping
B. Dumpster diving
C. Phishing
D. Social engineering
dumpster diving
Which of the following security terms best describes the process of determining what a user can do with a resource?
A. Authentication
B. Authorization
C. Accounting
D. Nonrepudiation
Authorization
Your network’s security model requires that the administrator configure permissions based on a user’s job within the company. What does this describe?
A. Rule-based access control
B. Role-based access control
C. Discretionary access control
D. Mandatory access control
Role-based Access control
Your friend Michael is setting up a wireless network and asks you which security option he should choose to make the network the most secure. What do you suggest?
A. WEP
B. WPA
C. WPA2
D. NAT
WPA2