CompTIA+ Chapter 17

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following are symptoms of viruses? (Select the three best answers.)

A computer runs slowly A computer locks up Unusual error messages are displayed

Which of the following is the strongest form of wireless encryption?

AES

Which of the following is the science of recognizing humans based on physical characteristics?

Biometrics

Which of the following describes an attempt to guess a password by using a combination of letters and numbers?

Brute force

Which of the following helps to secure a SOHO router?

Change default passwords Enable MAC filtering Enable WPA2

A hard drive needs to be disposed of in a way so that no one can access the date/ Which method should be used?

Destruction

You want to prevent rogue employees from connecting a laptop to the SOHO router and accessing the network. How can you accomplish this?

Enable MAC filtering Disable physical ports

Which of the following best describes encryption?

Prevents unauthorized users from viewing or reading data

One of the users on your network is trying to access files shared on a remote computer. The file's share permissions allow the user full control but the NTFS permissions allow the user Read access. Which of the following will be the resulting access for the user?

Read

Which of the following is the best mode to use when scanning for viruses?

Safe Mode

One of your customers tells you that a bank employee called and asked her for her bank balance and telephone number. What is this an example of?

Social Engineering

Which type of malware is the abuse of electronic messaging systems?

Spam

You are the administrator for your network and you set up an administrative share called Data$. Which of the following is necessary in order for another user to access this share? (Select the two best answers.)

The user must have permission to access the share The user must know the exact network path to the share

Which of the following is the strongest password?

This1sV#ryS3cure

Which of the following is a security component of Windows?

UAC

A customer complains that while he was away at lunch, someone used his computer to send e-mails to other co-workers without his knowledge. Which of the following should you recommend?

Use the Windows lock feature

Which of the following types of malware self-replicates

Worm


Conjuntos de estudio relacionados

Understanding Normal and Clinical Nutrition

View Set

acct ii ch 14 ungraded questions

View Set

What is the job of judicial branch

View Set