ExamCompass CompTIA A+ (220-1002) Practice tests 2nd set

¡Supera tus tareas y exámenes ahora con Quizwiz!

An attack against encrypted data that relies heavily on computing power to check all possible password combinations until the correct one is found is known as:

Brute-force attack

What is the function of the Linux chmod command?

Changes file access permissions

Which of the following steps enable displaying protected system files in Windows 8/8.1/10?

Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives / Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files.

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.

Group Policy

What kind of general term is used to describe the process of securing a computer system?

Hardening

Which of the following answers refers to the contents of a rainbow table entry?

Hash/Password

Examples of secure network protocols used for establishing VPN connections include:

IPsec / TLS

Which of the following authentication protocols can be used to enable SSO in Windows-based network environments?

Kerberos

Which of the following is an example of spyware?

Keylogger

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.

Login script

Which of the following account management security measures narrows down a user's computer access to specified hours?

Login time restrictions

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

Malware

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

Maximum password age setting

Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?

Minimum password age setting

Which of the following examples meets the requirement of multi-factor authentication?

Password and biometric scan

Which of the following password best practices would mitigate the security risk posed by temporary workers?

Password expiration

Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused?

Password history setting

What are the characteristic features of RADIUS?

Primarily used for network access / Combines authentication and authorization / Encrypts only the password in the access-request packet.

A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:

Proximity card

A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:

RFID badge

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

Ransomware

Which of the following terms refers to an example of crypto-malware?

Ransomware

The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels?

Read when accessing the share remotely / Modify when accessing the folder locally.

The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels?

Read when accessing the share remotely / Read when accessing the folder locally.

Which of the following enables troubleshooting a malware-infected system that doesn't boot up?

Recovery console

Which of the macOS features enables access to optical drive of another computer over a network?

Remote Disc

Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions?

Right-click on an application icon -> select Run as administrator from the pop-up menu / In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon / Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter.

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

Rootkit

Which of the following user groups in Windows 7/8/8.1/10 can use most software and change system settings that don't affect other users or computer's security?

Standard Users

What are the characteristic features of a WPA/WPA2 Enterprise mode?

Suitable for large corporate networks / Requires RADIUS authentication server.

A security protocol designed to strengthen WEP implementations is known as:

TKIP

A type of critical file that a computer system depends on to operate properly is known as a system file. In Microsoft Windows, system files are hidden by default; they might also have Read-only attribute turned on to prevent accidental changes to the file contents. Windows system files can be permanently displayed in Windows Explorer (Windows 7), or File Explorer (Windows 8/8.1/10) after modifying file and folder settings in the Folder Options applet in Windows 7 Control Panel, or File Explorer Options applet in Windows 8/8.1/10 Control Panel. T or F

True

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. T or F

True

In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas. T or F

True

In IT security, the term "User authentication" refers to the process of proving user identity to a system. Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual, such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns such as keyboard typing style ("something you do"). Multi-factor authentication systems require implementation of authentication factors from two or more different categories. T or F

True

In MS Windows, the attrib command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). With attrib, the "+" symbol sets an attribute for a file, the "-" sign removes the attribute. T or F

True

In NTFS, a folder or file copied or moved from one location to another on a different volume inherits permissions of its new parent folder. T or F

True

In the context of MS Windows system management, the term "Administrative share" refers to a hidden network share on a local computer designed to be accessed remotely by network administrators. T or F

True

NTFS permissions apply to both network and local users. NTFS permissions can be applied to a folder or individual file. T or F

True

Which of the following is a set of firewall entries containing information on traffic considered safe enough to pass through?

Whitelist

Which of the following terms describes a large network of Windows-based PCs under single administration?

Windows domain

What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth?

Worm

What is the name of a software tool used for finding and installing software packages on Debian and Debian-based Linux distributions?

apt-get

Which of the following answers lists the correct syntax for applying the read-only attribute to a file?

attrib +R [drive:] [path] [filename]

Which of the following Linux command-line commands enables directory traversal?

cd

A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called:

dd

A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called:

grep

A Linux command-line utility used for displaying and modifying network interface configuration settings is called:

ifconfig

Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication?

iwconfig

Which of the Linux command-line commands allows to terminate a running process?

kill

Which of the following Linux commands is used to display information about files and directories contained within the current working directory?

ls

What is the name of the Linux command used for renaming files and directories?

mv

Which of the following is a Linux command for transferring files/directories to a different directory?

mv

Which of the following are examples of administrative share names in Windows?

print$ / IPC$

What is the name of a Linux command-line utility used for displaying statistics of running processes?

ps

A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called:

pwd

A command-line command in Linux used for deleting files and directories is known as:

rm

The following command can be used for turning off or restarting a Linux host.

shutdown

Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account?

su

A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:

sudo

Which of the following commands is used for invoking a text editor in Unix-like operating systems?

vi

A rule-based access control mechanism implemented on routers, switches, and firewalls is known as:

(ACL) Access Control List

Which of the following is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

(ACL) Access Control List

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

(DLP) Data Loss Prevention

Which type of software enables a centralized administration of mobile devices?

(MDM) Mobile Device Manager

Which of the following attacks relies on intercepting and altering data sent between two networked hosts?

(MITM) Man In The Middle attack

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as:

(SSO) Single Sign On

A strong password that meets the password complexity requirement should contain:

A combination of characters from at least 3 character groups

Which of the following statements apply to the definition of a computer virus?

A self-replicating computer program containing malicious segment / Requires its host application to be run to make the virus active / Attaches itself to an application program or other executable component.

Which of the following cryptographic algorithms is the least vulnerable to attacks?

AES

Which of the following is a package management system most often used on Debian and Debian-based Linux distributions?

APT

A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as:

Active Directory

AES-based encryption mode is a characteristic feature of:

WPA2

Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)?

Apple menu -> System Preferences... -> Mouse / Apple menu -> System Preferences... -> Trackpad.

Which of the following statements describing share permissions in MS Windows are true?

Apply only to network users / Can be set on a folder level.

Which of the following statements describing NTFS permissions in MS Windows are true?

Apply to both network and local users / Can be applied to a folder or individual file.

Which of the following would be the best recommendation for a minimum password length?

At least 8 characters

Which of the following is one of the functions provided by RADIUS and TACACS servers?

Authentication

What is the name of a Microsoft Windows feature that allows for encrypting entire drives?

BitLocker

A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:

BitLocker To Go

Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment?

Boot Camp

Which of the following steps enable displaying protected system files in Windows 7?

Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files / Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives

Which of the following can be used by system administrators to selectively block access to known malware sites?

DNS configuration

What are the characteristics of TACACS+?

Encrypts the entire payload of the access-request packet / Primarily used for device administration / Separates authentication and authorization.

Which of the following would be the best malware-prevention method/tool?

End user education

An antivirus software is kept up to date via:

Engine updates / Virus signature updates

What is the correct hierarchy of precedence for permissions settings in NTFS?

Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow

In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder. T or F

False

In NTFS, permissions inherited from a parent object (e.g. a folder or user group) take precedence over permissions applied directly to an object (explicit permissions). T or F

False

In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files. T or F

False

A macOS file manager application is known as:

Finder

Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location?

Folder redirection

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).

True

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app). T or F

True

Permission propagation occurs when a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e. folders and files created inside the parent folder). T or F

True

Rainbow tables are lookup tables used to speed up the process of password guessing. T or F

True

Restoring the entire system from a known good backup copy is the most reliable method for effective malware removal. T or F

True

The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection. T or F

True

VPN connection types are divided into remote-access VPNs (used for connecting a computer to a network), and site-to-site VPNs (used for connecting networks). T or F

True

Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU. T or F

True


Conjuntos de estudio relacionados

BUSMHR 2500 Chapter 8 The Marketing Plan

View Set

Sutherland Information security final

View Set

Rad 141-Elbow and Distal Humerus

View Set

Marketing Exam 1 - Ch 3/4 Quiz (BUS2 130(

View Set