IT Fundamentals Quiz #2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Hardening

Device ____ is a collection of security tasks used to reduce the scope of the device's vulnerability and attack surface.

Preview Pane

Displays a preview of files such as documents, presentation slides, and images without opening them in an application.

Address bar

Displays the address of an object. It is located below the Ribbon.

Details Pane

Displays the file properties such as file name, file type, author, last modified, size, and other properties.

Pairing

By using Bluetooth technology, mobile devices can establish a connection through a process called ____.

Explorer

File ____ is a Windows utility application that offers a single view of all the resources and information that you can access from a computer.

System, user

Files are classified ____ and ____ files.

Ribbon

Is displayed below the title bar. It can show a list of common tasks depending upon the selected object or objects.

Navigation Pane

Is located in the left pane of the window; it enables you to scroll and directly access folders on your PC.

False

True or False: Deleting or modifying system files has no adverse impact to their functionality.

True

True or False: Dumpster diving can be prevented by properly disposing of paper and hardware.

True

True or False: If you are a computer administrator, create a new administrator account other than the normal login for security purposes.

False

True or False: Non-Windows devices such as Mac, Linux, and Android™ devices also use letters to identify different drives on which content is stored.

True

True or False: On a mobile device, you can access email in one of two ways: web-based or client-based.

True

True or False: Power strips alone do not provide any sort of protection against surges, outages, or any other anomalous electrical behavior.

True

True or False: Shortcut icons can be recognized by the arrow in the lower-left corner of the icon.

True

True or False: Shortcut keys are sometimes referred to as hot keys.

False

True or False: The Recycle Bin stores folders and files that were deleted from removable media such as USB drives or network drives.

False

True or False: There are no risks associated with upgrading software.

True

True or False: Whaling is a form of phishing that targets individuals who are known to possess a good deal of wealth.

True

True or False: You can compress multiple files and folders into a single compressed file.

True

True or False: You can manage user access to files and folder objects on a computer by modifying their permissions.

Program, System

Two folders that you should strictly avoid deleting are the ____ Files and ____ Folders.

Airplane

Use the ____ mode setting to quickly disconnect a mobile device from Wi-Fi and cellular connections, disabling the ability to send and receive calls, email, and text messages.

Authentication

User ____ is a network security measure in which a computer user or some other network component proves its identity in order to gain access to network resources.

Disable Bluetooth

Which Device hardening technique prevents Bluesnarfing? 1.) Disable Bluetooth 2.) Encryption 3.) Anti-Malware 4.)Timeouts and Lockouts

IP Spoofing

Which attack is not considered a social engineering attack? 1.) vishing 2.) Whaling 3.) Hoax 4.) IP Spoofing

Network attached storage

Which backup storage solution is popular for small-to-mid-size companies that need to share network storage with dozens of employees in an efficient manner? 1.) Local attached storage 2.) Network attached storage 3.) Cloud Solution 4.) Offsite Solution

Hidden (H)

Which file attribute indicates a hidden file in the file management tools?

Archive (A)

Which file attribute indicates that a file has not been backed up?

System (S)

Which file attribute indicates that a file is used by the operating system?

Finder

Which file management system is used on Mac computers?

Alt+Print Screen

Which key combination can also create active window screen captures?

Plasma Screen

Which option does not reduce the amount of power and energy your electronics consume? 1.) Liquid Crystal Display (LCD) 2.) Solid State Drive (SSD) 3.) Network-Attached Storage (NAS) 4.)Plasma Screen

Extensions

Which option indicates a file's type?

Root

Which option is not a Windows built-in account? 1.) Administrator 2.) Root 3.) Standard User 4.) Guest

Sports

Which option is not a default Windows' folder type? 1.) General Items 2.) Documents 3.) Music 4.) Sports

Telephone Number

Which option is not an example of PII infromation? 1.) Telephone Number 2.) Social Security Number 3.) Bank Account Number 4.) Driver's License Number

Cut Fiber Cables

Which option is not considered to a Natural threat? 1.) Tornadoes 2.) Cut Fiber Cables 3.) Hurricanes 4.) Snow Storms

SMTP

is used to send email from a client to a server or between servers.

IMAP

messages generally remain on the server while the client works with them as if they were local.

Stealing

obtaining passwords by various means , including sniffing network communications, reading handwritten password notes, or observing a user in the act of entering the password.

POP3

once the messages are retrieved and downloaded to the client, they are generally deleted from the server.

Hybrid Attack

utilizes multiple attack vectors including dictionary, brute-force, and other attack methodologies when trying to crack a password.

Word

.docx identifies which application?

White

A ____ hat is a hacker who discovers and exposes security flaws in applications and operating systems so that manufacturers can fix them before they become widespread problems.

Black

A ____ hat is a hacker who discovers and exposes security vulnerabilities for financial gain or for some malicious purpose.

Folder

A ____ is a container object that can store your files in an organized manner.

Shortcut

A ____ is a link or pointer to a program, file, or folder that is represented by a small icon.

Logic Bomb

A ____ is a piece of code that sits dormant on a target computer until it is triggered by a specific event, such as a specific date.

Virus

A ____ is a piece of code that spreads from one computer to another by attaching itself to other files.

Worm

A ____ is a piece of code that spreads from one computer to another on its own, not by attaching itself to another file.

Cookie

A ____ is a text file that is created by a website and placed on a computer's hard drive to store information that is used to identify users and, possibly, to prepare customized web pages for them

Trojan Horse

A ____ is an insidious type of malware that is itself a software attack and can pave the way for a number of other types of attacks.

File

A ____ is s an object that stores information on a computer. It can contain user data, in the case of document files, or it can contain program code, in the case of application files.

Subfolder

A folder within a folder is called a ____.

Cache

An internet ____ is a local storage area that holds the files saved by a web browser to decrease the time it takes to reload a web page.

Brute Force Attack

Attacker uses password-cracking software to attempt every possible alphanumeric password combination.

Dictionary attack

Automates password guessing by comparing encrypted passwords against a predetermined list of possible password values.

Ctrl+C

Copy the selected file or folder.

Nesting

Creating new files and folders within existing folders is called ____ folders.

Ctrl+X

Cut the selected file or folder.

Synchronization

Data ____ is the process of automatically merging and updating common data that is stored on multiple devices.

Ctrl+D

Delete and send object to the Recycle Bin.

Exchange ActiveSync

Microsoft's synchronization protocol is called?

Near Field Communication

NFC is most often used for in-person transactions or data exchange, What does NFC stand for?

Ctrl+V

Paste the selected file or folder.

Extracting

Restoring a compressed file to its original size is called ____.

Single Sign-On

SSO stands for?

Ctrl+S

Save the file from within a Windows application.

Accelerator, Gyroscope

Screen orientation changes automatically with the position of the mobile devices. This function is possible due to advanced mobile OS technology that includes an ____ and a ____.

chkdsk

The ____ .exe command verifies the logical integrity of a file system.

Recycle Bin

The ____ ____ is a container object located on the desktop that temporarily stores deleted files.

Refresh

The ____ button allows you to see the latest changes in the folder window.

True

True or False: Backups need to be consistently tested to verify that your data is intact and not corrupted.

True

True or False: Computers function best in a relative humidity of 50 to 60 percent.

False

True or False: Deleting a shortcut deletes the item to which it is pointing.

Guessing

The simplest type of password attack.

Cracker

The term ____ is sometimes used to refer to as a hacker or an attacker.

Shift

To select contiguous objects, select the first one and then press ____ when you select the last object.

A

To select everything in a container, select Ctrl +____.

True

True or False: A UPS or generator mitigates the risk of losing external power.

True

True or False: A bank ATM card is a common example of Multifactor authentication.

False

True or False: Airplane mode reduces battery life on your mobile device.

True

True or False: Backing Up Data guidelines recommend that you backup your data or the entire system prior to installing new hardware or software.

Use special characters such as the backslash ( \ ), the forward slash ( / ), the vertical bar ( | ), the colon ( : ), the asterisk ( * ), the question mark ( ? ), the quotation mark ( " ), the less than ( < ), and the greater than ( > ) characters.

Which option is not recommended when naming folders? 1.)Use a name that indicates the content or purpose of the document, project, or task. 2.)Use special characters such as the backslash ( \ ), the forward slash ( / ), the vertical bar ( | ), the colon ( : ), the asterisk ( * ), the question mark ( ? ), the quotation mark ( " ), the less than ( < ), and the greater than ( > ) characters. 3.)Limit the length of the name; although 260 characters can be used, file names of this length are impractical. 4.)Name folders using a logical scheme to help organize your data properly.

Disable remote backups

Which security configuration setting is not recommended for mobile devices? 1.) Enable screen lock and passcode settings. 2.) Require remote wipes. 3.) Configure device encryption. 4.) Disable remote backups

Rootkit

____ Code that is intended to take full or partial control of a system at the lowest levels.

Spam

____ Email-based threat that presents various advertising materials,promotional content, or get-rich-quick schemes to users.

Ransomware

____ Malicious software that prevents you from using your computer.

Adware

____ Software that automatically displays or downloads advertisements when it is used

Compressing

____ a file is the process of reducing the size of a file.

Electrostatic

____ discharge occurs when a path is created that allows electrons to rush from a statically charged body to another with an unequal charge.

Spyware

____ is Surreptitiously installed malicious software that is intended to track and report the usage of a target system, or to collect other data the author wishes to obtain.

Bluetooth

____ is a wireless technology that facilitates short-range wireless communication between devices.

Malware

____ is any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition.

Ergonomics

____ is the study of a person's efficiency at the workplace as it relates to his or her health, safety, and productivity.

Shortcut

____ key combinations enable users to perform the same actions that are normally performed by using the mouse, but instead by using the keyboard.

Backups

____ protect against data loss due to disasters such as file corruption or hardware failure.

Automatic

____ updates is a feature of an operating system or a software application that enables updates to be downloaded and installed automatically on a system at a scheduled time or a certain frequency.


Kaugnay na mga set ng pag-aaral

The impact of Napoleon's rule on France 1799 to 1815

View Set

Lower Respiratory Tract Infections and Disorders

View Set

Ch.5-8 quiz business communication

View Set