CompTIA A+ Chapter 16

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the first thing you should do when you discover a computer is infected with malware? The second thing? a. Turn off system protection. b. Update installed anti-malware software. c. Format the hard drive. d. Quarantine the computer.

First: d. Quarantine the computer. Second: b. Update installed anti-malware software. Try to first rid the system of malware before you format the hard drive and reinstall Windows unless the malware yoususpect is present is especially dangerous.

10. What folder is used by Windows to hold restore points?

The System Volume Information folder is used by Windows to hold restore points. When you turn off SystemProtection, all restore points stored in this folder are deleted.

What must you do in Windows to allow anti-malware software to scan and delete malware it might find in the data storagearea where restore points are kept?

Turn off System Protection to allow anti-malware software to scan and delete malware it might find in the datastorage area where restore points are kept. When System Protection is turned off, all restore points are deleted.

Which definition describes a virus? A Trojan? a. A program that can replicate by attaching itself to another program b. A program that can spread copies of itself throughout a network without a host program c. A program that does not need a host program to work; it substitutes itself for, and pretends to be, a legitimate program d. A program that displays ads in a web browser

Virus: a. A program that can replicate by attaching itself to another program. Trojan: c. A program that doesnot need a host program to work; it substitutes itself for, and pretends to be, a legitimate program A virus needs another program to execute before it can launch, but a Trojan does not require a host program.

What is the best way to determine if an email message warning about a virus is a hoax? a. Check websites that track virus hoaxes. b. Scan the message for misspelled words or grammar errors. c. Open the message and see what happens. d. Scan your email inbox for malware.

a. Check websites that track virus hoaxes. A hoax email often does have misspelled words or grammar errors and scanning can detect malware, but the quickestway to determine an email hoax is to search the web. Never open a message just to see what happens, especially if yoususpect it is a hoax.

What registry key keeps information about services that run when a computer is booted into Safe Mode?

: HKLM\System\CurrentControlSet\Control\SafeBoot If malware launches even when booting into Safe Mode, this key can help you find how the malware is launched.

You sign in to your personal computer with your Microsoft account, and you want to set up your computer as a trusteddevice to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter thecode on a Windows screen. This type of authentication is called _________________. a. multifactor authentication b. mutual authentication c. biometric authentication d. None of the answers are correct

: a. multifactor authentication Multifactor authentication uses more than one method to authenticate you. The two methods in this example are thepassword you used to sign in to your Microsoft account and the text you see on your cell phone.

8. What does anti-malware software look for to determine that a program or a process is a virus?

Anti-malware software looks for a virus signature.Updates to the anti-malware software include updates to new virus signatures used to identify newly released malware.

What is one difference between a video surveillance camera and a webcam? Select all that apply. a. One camera is a part of the IoT, and the other is not. b. One camera is accessible from the Internet, and the other is not. c. One camera has an IP address, and the other does not. d. One camera has a lens, and the other does not.

a. One camera is a part of the IoT, and the other is not; c. One camera has an IP address, and the other does not. A video surveillance camera has an IP address and can transmit data over a network, and a webcam is a peripheral deviceinstalled on a computer, which transmits the data from the webcam.

Among the following, which is the best protection against ransomware? a. Windows File History b. Carbonite c. Keylogger software d. Authy by Twilio

b. Carbonite Of the options given, Carbonite is the best protection against ransomware because it backs up your data to the cloud, andFile Explorer cannot access it. Ransomware attacks can assess any data that File Explorer is able to access.

At a restaurant, you overhear people discussing an interesting case they treated while working in a dental office that day.Which type of regulated data policies are most likely to have been violated? a. PII b. PHI c. PCI d. GDPR

b. PHI Protected health information (PHI) is regulated by the United States government via the HIPAA act of 1996.

A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the systemfreezes, and you see a blue screen of death. You have important document files on the drive that are not backed up. What doyou do first? Explain why this is your first choice. a. Try a data-recovery service even though it is expensive. b. Remove the hard drive from the computer case, and install it in another computer. c. Try GetDataBack by Runtime Software (runtime.org) to recover the data. d. Use Windows utilities to attempt to fix the Windows boot problem.e. Run antivirus software to remove the virus.

b. Remove the hard drive from the computer case, and install it in another computer. Because recovering the data is the top priority, you don't want to do anything to risk further damage to this data. Thechoice that is least likely to affect the data is removing the hard drive from the computer case and installing it in anothercomputer. Then boot into Windows and try copying the data from the bad hard drive to the good drive. After you'verecovered the data, you can use anti-malware software on the second computer to scan the hard drive for malware.

An employee uses a key fob to access corporate resources from their home office. What type of authentication are theyusing? a. Mutual authentication b. Soft token c. Authenticator app d. SMS messaging

b. Soft token A soft or hard token proves you have something. The number showing on the key fob changes every 60 seconds and iskeyed in to the authentication system

When you started your new job, your training included reading through the company intranet website AUP pages. Thismorning you see a coworker violating a policy. You ask whether they are aware that they are violating the policy, and theyrespond that they are aware. What is your next step? a. Ignore the incident and wait to see whether it happens again. b. Tell your manager about the situation. c. Tell another coworker and ask them what you should do. d. Ask a coworker how to fill out an incident report.

b. Tell your manager about the situation. Your responsibility is to tell your manager so they can decide how to deal with the situation.

You suspect a boot sector virus has infected your computer. How can you remove the virus? a. Perform a full scan using Microsoft Defender Antivirus. b. Replace the hard drive. c. Perform a Microsoft Defender Offline scan. d. Boot the system in Safe Mode with Networking, and run Microsoft Defender Antivirus

c. Perform a Microsoft Defender Offline scan. Boot sector viruses can be removed before the operating system launches.

u work in the IT department of a large hospital, and your manager has asked you to dispose of several old laptopspreviously used by the medical staff. How do you proceed? a. Delete all user accounts on the laptops, and donate them to a nonprofit organization. b. Remove the hard drives from all the laptops, replace them with new hard drives, and then donate them to anonprofit organization. c. Physically destroy all the hard drives, and then donate the laptops to the computer repair labs at the localcommunity college. d. Sell the laptops on eBay.com, and donate the money to a charity of your choice

c. Physically destroy all the hard drives, and then donate the laptops to the computer repair labs at the localcommunity college. Because the laptops have been used by the medical staff, assume the hard drives hold PHI, making it especiallyimportant that the drives be destroyed.

What tool is best to use when destroying data on an SSD? a. Zero-fill utility b. Low-level format c. Degausser d. ATA Secure Erase

d. ATA Secure Erase The ATA Secure Erase technology is approved as the legal method to wipe clean an SSD

What device can be installed on a laptop to prevent shoulder surfing? a. USB port b. Smart card reader c. Fingerprint reader d. Privacy filter

d. Privacy filter A privacy filter prevents someone from viewing the screen from either side of the screen

You sign in to your banking website on a new computer and get a request that the bank needs to send you a text code to yourcell phone to authenticate the sign in. Why is this method of authentication not secure? a. Biometric data is not being used. b. The digital certificate for the bank's website may be outdated. c. Multifactor authentication does not authenticate the user. d. SMS text is not encrypted.

d. SMS text is not encrypted. Text to cell phones use SMS protocol and system, which sends data as plain text and is easily intercepted by hackers.


Ensembles d'études connexes

washington D.C: the nation s capital

View Set

16.1 The endocrine system is one of the body's two major control systems.

View Set

Mental Health Exam 1 Prep-U Ch's 2, 5, 6, 7, 8, 10, 13, 14, 15, 16, 17, 18, 20, 24

View Set

6.3 Explain the core concepts of Public Key Infrastructure

View Set