CompTIA+ Chapter 17
Which of the following are symptoms of viruses? (Select the three best answers.)
A computer runs slowly A computer locks up Unusual error messages are displayed
Which of the following is the strongest form of wireless encryption?
AES
Which of the following is the science of recognizing humans based on physical characteristics?
Biometrics
Which of the following describes an attempt to guess a password by using a combination of letters and numbers?
Brute force
Which of the following helps to secure a SOHO router?
Change default passwords Enable MAC filtering Enable WPA2
A hard drive needs to be disposed of in a way so that no one can access the date/ Which method should be used?
Destruction
You want to prevent rogue employees from connecting a laptop to the SOHO router and accessing the network. How can you accomplish this?
Enable MAC filtering Disable physical ports
Which of the following best describes encryption?
Prevents unauthorized users from viewing or reading data
One of the users on your network is trying to access files shared on a remote computer. The file's share permissions allow the user full control but the NTFS permissions allow the user Read access. Which of the following will be the resulting access for the user?
Read
Which of the following is the best mode to use when scanning for viruses?
Safe Mode
One of your customers tells you that a bank employee called and asked her for her bank balance and telephone number. What is this an example of?
Social Engineering
Which type of malware is the abuse of electronic messaging systems?
Spam
You are the administrator for your network and you set up an administrative share called Data$. Which of the following is necessary in order for another user to access this share? (Select the two best answers.)
The user must have permission to access the share The user must know the exact network path to the share
Which of the following is the strongest password?
This1sV#ryS3cure
Which of the following is a security component of Windows?
UAC
A customer complains that while he was away at lunch, someone used his computer to send e-mails to other co-workers without his knowledge. Which of the following should you recommend?
Use the Windows lock feature
Which of the following types of malware self-replicates
Worm