IT Fundamentals Quiz #2
Hardening
Device ____ is a collection of security tasks used to reduce the scope of the device's vulnerability and attack surface.
Preview Pane
Displays a preview of files such as documents, presentation slides, and images without opening them in an application.
Address bar
Displays the address of an object. It is located below the Ribbon.
Details Pane
Displays the file properties such as file name, file type, author, last modified, size, and other properties.
Pairing
By using Bluetooth technology, mobile devices can establish a connection through a process called ____.
Explorer
File ____ is a Windows utility application that offers a single view of all the resources and information that you can access from a computer.
System, user
Files are classified ____ and ____ files.
Ribbon
Is displayed below the title bar. It can show a list of common tasks depending upon the selected object or objects.
Navigation Pane
Is located in the left pane of the window; it enables you to scroll and directly access folders on your PC.
False
True or False: Deleting or modifying system files has no adverse impact to their functionality.
True
True or False: Dumpster diving can be prevented by properly disposing of paper and hardware.
True
True or False: If you are a computer administrator, create a new administrator account other than the normal login for security purposes.
False
True or False: Non-Windows devices such as Mac, Linux, and Android™ devices also use letters to identify different drives on which content is stored.
True
True or False: On a mobile device, you can access email in one of two ways: web-based or client-based.
True
True or False: Power strips alone do not provide any sort of protection against surges, outages, or any other anomalous electrical behavior.
True
True or False: Shortcut icons can be recognized by the arrow in the lower-left corner of the icon.
True
True or False: Shortcut keys are sometimes referred to as hot keys.
False
True or False: The Recycle Bin stores folders and files that were deleted from removable media such as USB drives or network drives.
False
True or False: There are no risks associated with upgrading software.
True
True or False: Whaling is a form of phishing that targets individuals who are known to possess a good deal of wealth.
True
True or False: You can compress multiple files and folders into a single compressed file.
True
True or False: You can manage user access to files and folder objects on a computer by modifying their permissions.
Program, System
Two folders that you should strictly avoid deleting are the ____ Files and ____ Folders.
Airplane
Use the ____ mode setting to quickly disconnect a mobile device from Wi-Fi and cellular connections, disabling the ability to send and receive calls, email, and text messages.
Authentication
User ____ is a network security measure in which a computer user or some other network component proves its identity in order to gain access to network resources.
Disable Bluetooth
Which Device hardening technique prevents Bluesnarfing? 1.) Disable Bluetooth 2.) Encryption 3.) Anti-Malware 4.)Timeouts and Lockouts
IP Spoofing
Which attack is not considered a social engineering attack? 1.) vishing 2.) Whaling 3.) Hoax 4.) IP Spoofing
Network attached storage
Which backup storage solution is popular for small-to-mid-size companies that need to share network storage with dozens of employees in an efficient manner? 1.) Local attached storage 2.) Network attached storage 3.) Cloud Solution 4.) Offsite Solution
Hidden (H)
Which file attribute indicates a hidden file in the file management tools?
Archive (A)
Which file attribute indicates that a file has not been backed up?
System (S)
Which file attribute indicates that a file is used by the operating system?
Finder
Which file management system is used on Mac computers?
Alt+Print Screen
Which key combination can also create active window screen captures?
Plasma Screen
Which option does not reduce the amount of power and energy your electronics consume? 1.) Liquid Crystal Display (LCD) 2.) Solid State Drive (SSD) 3.) Network-Attached Storage (NAS) 4.)Plasma Screen
Extensions
Which option indicates a file's type?
Root
Which option is not a Windows built-in account? 1.) Administrator 2.) Root 3.) Standard User 4.) Guest
Sports
Which option is not a default Windows' folder type? 1.) General Items 2.) Documents 3.) Music 4.) Sports
Telephone Number
Which option is not an example of PII infromation? 1.) Telephone Number 2.) Social Security Number 3.) Bank Account Number 4.) Driver's License Number
Cut Fiber Cables
Which option is not considered to a Natural threat? 1.) Tornadoes 2.) Cut Fiber Cables 3.) Hurricanes 4.) Snow Storms
SMTP
is used to send email from a client to a server or between servers.
IMAP
messages generally remain on the server while the client works with them as if they were local.
Stealing
obtaining passwords by various means , including sniffing network communications, reading handwritten password notes, or observing a user in the act of entering the password.
POP3
once the messages are retrieved and downloaded to the client, they are generally deleted from the server.
Hybrid Attack
utilizes multiple attack vectors including dictionary, brute-force, and other attack methodologies when trying to crack a password.
Word
.docx identifies which application?
White
A ____ hat is a hacker who discovers and exposes security flaws in applications and operating systems so that manufacturers can fix them before they become widespread problems.
Black
A ____ hat is a hacker who discovers and exposes security vulnerabilities for financial gain or for some malicious purpose.
Folder
A ____ is a container object that can store your files in an organized manner.
Shortcut
A ____ is a link or pointer to a program, file, or folder that is represented by a small icon.
Logic Bomb
A ____ is a piece of code that sits dormant on a target computer until it is triggered by a specific event, such as a specific date.
Virus
A ____ is a piece of code that spreads from one computer to another by attaching itself to other files.
Worm
A ____ is a piece of code that spreads from one computer to another on its own, not by attaching itself to another file.
Cookie
A ____ is a text file that is created by a website and placed on a computer's hard drive to store information that is used to identify users and, possibly, to prepare customized web pages for them
Trojan Horse
A ____ is an insidious type of malware that is itself a software attack and can pave the way for a number of other types of attacks.
File
A ____ is s an object that stores information on a computer. It can contain user data, in the case of document files, or it can contain program code, in the case of application files.
Subfolder
A folder within a folder is called a ____.
Cache
An internet ____ is a local storage area that holds the files saved by a web browser to decrease the time it takes to reload a web page.
Brute Force Attack
Attacker uses password-cracking software to attempt every possible alphanumeric password combination.
Dictionary attack
Automates password guessing by comparing encrypted passwords against a predetermined list of possible password values.
Ctrl+C
Copy the selected file or folder.
Nesting
Creating new files and folders within existing folders is called ____ folders.
Ctrl+X
Cut the selected file or folder.
Synchronization
Data ____ is the process of automatically merging and updating common data that is stored on multiple devices.
Ctrl+D
Delete and send object to the Recycle Bin.
Exchange ActiveSync
Microsoft's synchronization protocol is called?
Near Field Communication
NFC is most often used for in-person transactions or data exchange, What does NFC stand for?
Ctrl+V
Paste the selected file or folder.
Extracting
Restoring a compressed file to its original size is called ____.
Single Sign-On
SSO stands for?
Ctrl+S
Save the file from within a Windows application.
Accelerator, Gyroscope
Screen orientation changes automatically with the position of the mobile devices. This function is possible due to advanced mobile OS technology that includes an ____ and a ____.
chkdsk
The ____ .exe command verifies the logical integrity of a file system.
Recycle Bin
The ____ ____ is a container object located on the desktop that temporarily stores deleted files.
Refresh
The ____ button allows you to see the latest changes in the folder window.
True
True or False: Backups need to be consistently tested to verify that your data is intact and not corrupted.
True
True or False: Computers function best in a relative humidity of 50 to 60 percent.
False
True or False: Deleting a shortcut deletes the item to which it is pointing.
Guessing
The simplest type of password attack.
Cracker
The term ____ is sometimes used to refer to as a hacker or an attacker.
Shift
To select contiguous objects, select the first one and then press ____ when you select the last object.
A
To select everything in a container, select Ctrl +____.
True
True or False: A UPS or generator mitigates the risk of losing external power.
True
True or False: A bank ATM card is a common example of Multifactor authentication.
False
True or False: Airplane mode reduces battery life on your mobile device.
True
True or False: Backing Up Data guidelines recommend that you backup your data or the entire system prior to installing new hardware or software.
Use special characters such as the backslash ( \ ), the forward slash ( / ), the vertical bar ( | ), the colon ( : ), the asterisk ( * ), the question mark ( ? ), the quotation mark ( " ), the less than ( < ), and the greater than ( > ) characters.
Which option is not recommended when naming folders? 1.)Use a name that indicates the content or purpose of the document, project, or task. 2.)Use special characters such as the backslash ( \ ), the forward slash ( / ), the vertical bar ( | ), the colon ( : ), the asterisk ( * ), the question mark ( ? ), the quotation mark ( " ), the less than ( < ), and the greater than ( > ) characters. 3.)Limit the length of the name; although 260 characters can be used, file names of this length are impractical. 4.)Name folders using a logical scheme to help organize your data properly.
Disable remote backups
Which security configuration setting is not recommended for mobile devices? 1.) Enable screen lock and passcode settings. 2.) Require remote wipes. 3.) Configure device encryption. 4.) Disable remote backups
Rootkit
____ Code that is intended to take full or partial control of a system at the lowest levels.
Spam
____ Email-based threat that presents various advertising materials,promotional content, or get-rich-quick schemes to users.
Ransomware
____ Malicious software that prevents you from using your computer.
Adware
____ Software that automatically displays or downloads advertisements when it is used
Compressing
____ a file is the process of reducing the size of a file.
Electrostatic
____ discharge occurs when a path is created that allows electrons to rush from a statically charged body to another with an unequal charge.
Spyware
____ is Surreptitiously installed malicious software that is intended to track and report the usage of a target system, or to collect other data the author wishes to obtain.
Bluetooth
____ is a wireless technology that facilitates short-range wireless communication between devices.
Malware
____ is any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition.
Ergonomics
____ is the study of a person's efficiency at the workplace as it relates to his or her health, safety, and productivity.
Shortcut
____ key combinations enable users to perform the same actions that are normally performed by using the mouse, but instead by using the keyboard.
Backups
____ protect against data loss due to disasters such as file corruption or hardware failure.
Automatic
____ updates is a feature of an operating system or a software application that enables updates to be downloaded and installed automatically on a system at a scheduled time or a certain frequency.