902 practice test 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following are valid methods used to protect against social engineering? (Choose all that apply.) A User training B Separation of duties C Wireless encryption D Strong passwords

A, B

You suspect that an operating system problem is causing spontaneous shutdown and restart issues. Which of the following could cause this problem? (Choose all that apply.) A Corrupted system DLLs B Corrupted Registry database C Unavailable IP address D Improper network configuration

A, B

Which of the following choices are the best ways to ensure that server racks are grounded, do not overheat, and do not tip over? (Choose all that apply). A Raised floors B Hot and cold aisles C Lightning rods D Grounding straps E Putting the UPS on the top rack

A, B, C, D

From a healthcare IT perspective, which of the following statements are true about compliance to local government regulations? (Choose all that apply). A Comply with Material Safety Data Sheet requirements B Comply with reporting requirements if there is an incident C Comply with the Privacy Act D Comply with HIPPA E Comply with OSHA F Comply with Sarbanes Oxly.

A, B, C, D, E

Compliance with local government regulations has which of the following benefits? (Choose all that apply). A Avoiding penalties B Safety C Easy to follow D They are best practices E Environmental protection

A, B, D, E

Which of the following are used to create system images for image-based installations of Windows systems? (Choose all that apply.) A TruImage B Avast C ImageX D Ghost

A, C, D

In Windows 7, which of the following are the main nodes in Windows Firewall with Advanced Security applied? (Choose all that apply.) A Outbound Rules B Application Rules C Connection Security Rules D Inbound Rules E Monitoring

A, C, D, E

On a Windows 7 system, which of the following is not in the Administrative Tools applet? (Choose all that apply.) A Easy Transfer B Local Security Policy C Event Viewer D Command Prompt

A, D

A network administrator of a small enterprise wants to configure the network card to improve network speed of a Windows 7 operating system workstation. He wishes to enable the duplexing option. Which interface does he need to access? A IE - Tools - Internet Options - Connections - Speed and Duplex B Device Manager - Network Card - Properties - Advanced - Speed and Duplex C Start - Device Manger - Display Adaptor - Properties- Advanced - Speed and Duplex D Start - Run - ncpa.cpl - Ethernet - Properties - Speed and Duplex

B

A system performs an improper automatic shut down and restart. What could be the possible reason? A New hardware installation B Virus C Basic software not updated D Less disk space

B

A system, which is connected to a network, is facing a missing DLL file message. With all other recovery options which of these is an easiest option a network administrator can do to bring back the system to working at the earliest? A Use the Recovery Console CD B Copy the DLL message from other system with the same patch level C Use System Restore D Uninstall and reinstall the OS from the disk

B

A user of a home group recently experienced a situation where the computer failed to boot. The trouble shooting team identified that the boot sector file has been corrupted by a specific kind of virus. After successful OS reinstallation, the computer restarts. The system is now equipped with the best security software. The scan report has now identified a virus that has a specific name. Which one of these viruses will infect the boot sector of an operating system? A Phage virus B Multipartite virus C Polymorphic virus D Companion virus

B

A user wants to identify the sources of interference that is hampering the wireless connectivity of his device. Which tool will help him? A Digitizer B WiFi Analyzer C Interference Detector D WiFi Scanner

B

On most Android devices, what is the most common way to enable GPS? A Settings > Location Services B Settings > Location > Use GPS Satellites C Settings > AppStore > GPS Enable D Settings > WiFi > Enable

B

On which of the following tabs of the System Configuration (MSCONFIG) tool can you launch the Event Viewer? A Boot B Tools C Services D Startup E General

B

What is the term used to denote tricking a person into giving out their vital info? A Phishing B Social engineering C Whaling D Hacking

B

Which of these passwords can be considered to be the strongest of all? A C0mpTia B CompT1aS@V C ComptiaServ D C0mpt1aser

B

Which one is not a virus? A Phage B Ransomware C Polymorphic D Stealth

B

Which shortcut key should you need to use for opening the Terminal Window Command Line Interface on Ubuntu based Linux operating system? A CTRL + ALT + DEL B CTRL + ALT + T C CTRL + ALT + C D CTRL + SHIFT + T

B

Which switch is used with the DEFRAG command to defragment multiple volumes at once in Windows 7? A /H B /M C /A D /E

B

You are configuring a password for the management interface of a network switch. Which one of the following is the best password? A OnePass B 67HrYSm1th C Tom D Doubles

B

You are implementing a virtual machine on a Windows computer using VirtualBox. You want to ensure that the virtual hard drives used by the virtual machine are accessible only to those who can also run the virtual machine. Which of the following should you use to ensure the security requirements stated? A FAT32 permissions B NTFS permissions C Virtual machine permissions D VirtualBox permissions

B

You have connected a USB device to a Windows computer that is powered on but the device fails to start. Which one of the following should you verify? A The computer is plugged in B The proper driver is installed C The hard drive is working D The serial port is enabled

B

You want to secure your Windows 8 system. Which one is a portable security device that provides secure user-authentication using a PIN? A Cable locks B Smart Card C Entry control roster D Biometrics

B

You want to use the System Configuration (MSCONFIG) tool to show device driver names as they are loaded while the operating system is loading. Which of the following items should you select on the Boot tab? A Boot log B OS boot information C Safe boot D Base video

B

In a network based working environment, the employees were repeatedly asked to be cautious in viewing unauthorized emails and not to download any third-party attachments to protect the working environment. Which kind of malware has the ability to change permissions to the key files of the computer and facilitate the hacker to take control over the entire network from a remote location itself? (Choose all that apply) A Worm B Rootkit C Trojan horse D Bomb

B, C

On which of the following profiles can you individually enable or disable the Windows Firewall? (Choose all that apply.) A Domain B Public C Home or work D Secure

B, C

Which of the following commands can be used to repair an invalid boot disk error? (Choose all that apply.) A SFC B Fixmbr C Fixboot D REGSRV32

B, C

A Windows network printer being listed in the Active Directory domain of the company needs to be updated with new policy, since an additional wing of the company has been added to the existing topology. Which command will help the network administrator to force the printer to get the working policy updated with the new one? A GPRESULT B PRODUPDATE C GPUPDATE D PRINTUP

C

A company wants to provide VPN access to all its employees but has trouble identifying whether the user on the other end is the authorized person. Which of these will give a greater level of added security in addition to the password used? A Iris recognition B Smart-card C Key-fobs D RFID badge

C

ABC Inc., as a policy, wishes to ensure that the data carried out by its employees officially through external hard drives has to be protected. Which encryption technology could be the correct solution that can be applied to an external hard drive to prevent unauthorized access? A PKI B BitLocker C BitLocker To Go D EFS

C

How can an iPhone user protect his handset from getting connected to trap WLAN or Access Points automatically? A Keeping the Wireless Tethering option in Off condition B Enable Notification Alerts C Disabling the WiFi Auto-Join tab to off in the settings D Creating a Wireless PIN

C

In a company, a recently hired employee is asked to login with his credentials every time he tries to access a specific resource. Which security level has to be provided to him so that he can login once for a session and not every time he clicks a file? A Session-level security B File-level security C User-level security D Share-level security

C

In which of the following tabs does a system administrator execute the Registry Editor diagnostic tool? A Services B Startup C Tools D General

C

What does hijacked email mean? A Deleting the email client B Taking a complete backup of the inbox on a daily basis C Sending a copy of all emails to another system by making specific changes to the email client D Creating a false account and mapping the mails as received

C

What is the best way to stop unwanted pop ups from an online marketing website occurring repeatedly? A Disable the Pop Up Blocker B Block the Website C Enable the Pop Up Blocker D Spam the Weblink

C

Which approach can be a better option to practice to avoid future misunderstandings regarding a problem attended, and solution offered? A Do a troubleshooting demonstration for better understanding B Give proper hands on training to the customer for further troubleshooting if needed C Ask the customer to demonstrate their understanding of the solution D Document the service offered and hand over a copy to the customer after explaining

C

Which of the following file system conversions is possible with the current Windows operating system versions? A FAT to NTFS B FAT to FAT32 C FAT32 to NTFS D NTFS to FAT32

C

Which of these options is not a part of a locator application that is installed in an Android device? A Erase all data B Lock the device C Create warning beep sounds continuously D Send message to the device

C

Which one of these does not come under the account management policy of an organization? A Restricted login Time B Account getting locked for certain number of irregular attempts C Screensaver requiring password D Disabling the AutoRun feature

C

Which one of these is not important enough to be backed up for disaster recovery? A Key Data Files B Applications C Temporary Internet Files D Databases

C

Which solution is used to monitor network activity in an attempt to detect a possible attack? A VPN B IPSec C IDS D Rogue AP

C

A company has large number of employees who have various roles and responsibilities. Many times the company has encountered situations where data is accidentally deleted and/or duplicated. After effective brainstorming and analysis, the company has implemented one of the given policies to protect itself from data loss and/or duplication. Which policy is that? A Least privilege policy B Zero toleration policy C Email filtering policy D Smart card policy

A

A system user is encountering progressive slow performance after the addition of new files to the hard drive. Which one of these could be the best way to handle such a difficult situation, which restricts the user from using the computer? A Store data and application in a different partition of the Hard drive B Adding more RAM C Having hard drive of max capacity D Access files from the External hard drive.

A

As a system administrator, you need to maintain the health of a large network of Windows 8 computers. You are performing a quick health check on one of the systems and want to view the logs on another computer. Which tab of the Event Viewer provides an interface to view logs on another computer? A Actions B Custom View C Help D File

A

By default, which of the following is the status of the Guest account on Windows 7 computers? A Off B Disabled C On D Enabled

A

How can you terminate a process instead of ending the task in the Task Manager? A By using the TASKKILL.EXE utility in the command prompt window B By killing the task using the command prompt screen C By using the TASKKILL console D By uninstalling the process from the Control Panel

A

If a systems boot drive is heavily fragmented, what is the most likely result? A Slow system performance B Invalid boot disk C Missing NTLDR D Browser redirection

A

Which is the right time to perform low-level formatting on a hard drive? A Before partitioning the disk B During the yearly maintenance program C Before assembling the cabinet D At the time of first booting

A

Which of the following is accomplished via the GPS component within a tablet? A Location awareness B Recording video C Taking pictures D Playing audio

A

Which of the following options is a possible reason children are facing a tough time accessomg even educational content in their home with the one available computer that everybody including adults use? A The parental control features are set to wrong levels B The personal firewall level is too high C The internet options of the children accounts are set to high D The system is not been updated recently

A

A company Vice President has stored all passwords and other secure information in his phone. He is worried about the fact that if the phone is lost or stolen, misuse of passwords can cause financial damage besides the loss of the phone itself. He was relieved that his Apple phone has been provided with a remote wipe feature. This feature can remotely erase all data in case the device is lost or stolen. To have this enabled which version of IOS the phone should have? A iOS3 B iOS2 C iOS4 D iOS5

D

A system administrator has tried to run a patch file update and the operating system crashed, which resulted in a downtime of 4 hours. Which of these could be a best option for the administrator to prevent such events in future? A To run the patch file update in schedule downtime B To run the patch file update during annual maintenance period C To run patch file in safe mode D To run the patch file update in test machines first

D

A system user wants to have the Internet Explorer browser disabled as he has opted Opera in his new Windows 8.1 OS machine. Where exactly he can perform this function? A Start - Control Panel - Add or Remove Programs - Uninstall Internet Explorer B Start - Add or Remove Programs - Disable Internet Explorer C Start - Cmd - Disable IE D Start - Control Panel - Programs and Features - Turn Windows Features On or Off

D

After checking for all possible hardware and software issues, a touch-screen�s responsiveness problem was rectified completely by performing one of the following fixes. What is the fix? A Removing the SIM card and inserting it back B Removing the memory card permanently C Turning off the auto-rotate feature D Replacing the anti-scratch guard

D

After installing all possible security software in the network, a company has also enforced a strong password lock policy. The account will get locked after two consecutive wrong password entries by an employee. Why is the company enforcing such a strict password lock policy? A Protect the data from malicious program injections B Protect the MAC addresses from being spoofed C Create a phishing free environment D Protect the network from brute forcing

D

On which of the following security principles is User Account Control (UAC) partially based? A Least Ability B Discriminate Ability C Role-Based Access Control D Least Privilege

D

The internet access policy of a company wishes to grant internet access based on organizational hierarchy. They impose certain restrictions on the bottom line employees. Which of these servers will be the right choice for them to manage such a scenario? A DNS Server B Authentication Server C Mail Server D Proxy Server

D

What is a common reason for a laptop to encounter dim display? A Too many windows B Improper battery C Auto-brightness option D Backlight feature

D

What is the basic idea of having an option called Airplane mode in smart phones? A To get connected with added services provided by the ISP B To communicate with friends and relatives using the network provided by the airlines. C To have special settings during air takeoff and landing D To use all phone features other than wireless during air takeoff and landing

D

When initializing a 3 TB hard disk, which of the following actions needs to be done in addition to the regular initialization process followed for disks that are 2 TB or less in size? A Create a primary partition B Specify the filesystem to be used as NTFS C Assign a drive letter D Specify the partition style as GPT

D

Where are fonts stored in the Windows operating systems? A C:\Program Files\Fonts B C:\Fonts C C:\Windows\System32\Fonts D C:\Windows\Fonts

D

Which of the statements is true with respect to Enable MAC Filtering for improved wireless access security in a network? A The system users are provided with a username and password to get connected with the router. B The Administrator feeds a list of computers MAC address which is not allowed to access. C Enabling MAC filtering allows identification of individuals using MAC addresses. D It is also called as the Network Lock.

D

Which one of the below statements is false with respect to the Remote Assistance tool in a windows 8.1 computer? A You need to initiate an invitation to enable your trusted helper to view your screen and share control of your computer. B Remote Assistance feature allows you to invite someone to connect to your computer to help in solving issues related to your computer. C Remote Assistance feature is enabled by default. D Remote Assistance allows you to connect and login to a remote computer.

D

Which one of the following commands is used to ensure that the Windows file system files are not corrupted? A XCOPY B COPY C ROBOCOPY D SFC

D

Which one of the following is not covered under the security topics of Unified Threat Management? A Network intrusion, detection and prevention B Data- leak prevention C Content filtering D Monitoring the entire network

D

Which one of these basic activities is performed by the SFC Tool every time the system reboots after an improper shutdown? A Ensures that the system files are not changed to become a unprotected copy B Repairs the system files if found anything corrupted C Logs the reason why the improper shutdown has happened D Opens the computer in Last known good configuration mode once

D

Windows 7 introduced new wizards to help resolve problems on a computer. They include solutions in categories like Programs, Hardware and Sound, Network and Internet, and Appearance and Personalization. In which of the following applets are these solutions grouped in the Control Panel? A Device Manager B Administrative Tools C Parental Controls D Troubleshooting

D

You copy a file from one folder on the C: drive to another folder on the D: drive. What will happen to the file's permissions by default? A The file carries the original folder permissions with it to the new folder B The file has no permissions C The file carries its permissions with it to the new folder D The file inherits the permissions of the destination folder

D

You want to secure virtual machine configuration files with encryption. You store the configuration files on the D: drive. Which one of the following technologies will directly encrypt the configuration files? A Kerberos B FAT32 C PKI D BitLocker

D

You want to set up Internet Security in your Windows 8 to restrict Web sites that you believe will threaten the security of your computer. Which of the following settings should you customize? A Customize the Content Advisor settings on the Content tab in the Internet Options tool B Customize the settings on the Approved Sites tab in the Internet Options tool C Customize the settings in the Trusted Sites zone on the Security tab in the Internet Options tool D Customize the settings in the Restricted Sites zones on the Security tab in the Internet Options tool

D

Which of the following are the recommended procedures regarding respecting the customer's time? (Choose all that apply). A The most important customer you have is the biggest customer that you have B Give the customer an optimistic estimate of how long it will take fix a problem C If you discover that you have two appointments made for the same time, then rush through the first one, so you won't be too late for the second one. D Only take brief personal calls and excuse yourself before you do take them E Only take brief business calls and excuse yourself before you do take them F If you get delayed at an previous appointment, inform the next appointment ASAP G If you can't fix a problem in a reasonable period of time at the customer's desk (say 15 minutes), then schedule a time to pick up the computer and work on it back at the office. Offer the customer a spare if it is available.

F, G

Which one of the following is the best definition of firewalls? A Firewalls detect and prevent virus infections. B Firewalls encrypt all traffic passing through them. C Firewalls close all inbound ports to your computer or network except those that you explicitly allow. D Firewalls filter email messages for spam.

c


Ensembles d'études connexes

Psych PrepU application style questions 51Q no ans choice w/exp

View Set

Week 2 - Chapter 20: Informatics

View Set

Loving v Virginia Background Terms

View Set

Ch. 10 Communication and New Media

View Set