ITN 106 Finals
Which of the following can be done on the Internet Properties - Privacy tab? [Choose all that apply] Allow Cookies Deny Sites from asking for the physical location Allow Extensions Block Pop-ups
- Allowing/blocking cookies - Allow/deny sites from asking for the physical location - Allow/block pop-up - Allow/block extensions and toolbars when browsing privately
Which of the following would you use to secure a signal? [Choose all that apply] Device Names Encryption Authentication Network Name
- Encryption - Authentication
Which of the following Password policies are available on Windows 11? [Choose all that apply] Password must meet complexity requirements Minimum password age Maximum password age Enforce password history Maximum password length
- Enforce password history - Maximum password age - Minimum password age - Minimum password length - Minimum password length audit - Password must meet complexity requirements - Relax minimum password length limits - Store passwords using reversible encryption
Which of the following permissions are available with the NTFS File system? [Choose all that apply] Modify Full Control Read and execute Write Read
- Full control - Modify - Read and execute - List folder contents - Read - Write
What is the reason for encrypting a mobile device's hard drive? [Choose all that apply] Prevent the device from being unlocked with a password or PIN Prevent unauthorized access to the data on the device Prevent the device's hard drive from being accessed when lost or stolen Prevent the access to the location of the device when lost or stolen
- Prevent the device's hard drive from being accessed when lost or stolen - Prevent unauthorized access to the data on the device
Which of the following are examples of Remote Access Technologies? [Choose all that apply] 802.1 X TACACS WPA3 RADIUS Submit
- RADIUS - TACACS - 802.1 X
When can an Antivirus be disabled temporarily? [Choose all that apply] Concerns over privacy Optimizing your PC performance When installing another antivirus software onto the PC Interference with other applications
- When installing another antivirus software onto the PC - Interference with other applications - Optimizing your PC performance - Concerns over privacy
Which of the following will help prevent viruses from being downloaded onto your mobile device? Install anti-malware software on your device Download all files that are sent to you via an attachment Install spam software on your device Only download apps from a trusted installation source
-Install anti-malware software on your device - Only download apps from a trusted installation source
what ip address range did you scan for in the lab? 10.0.0.0 -254 10.0.0.1 -255 10.0.0.1 -254 all of these
10.0.0.1 -254
what is your servers IP address? Enter your answer in the space provided
10.0.2.15
How many characters are considered secure in LastPass? 8 10 12 16
12
How many live connections did you find in the lab ? 13 7 6 5
13
What's the port number for Hypertext Transfer Protocol Secure (HTTPS)? 80 143 389 22 433
433
How many devices are using the RDP protocol? 13 7 6 5
5
Which type of security control includes policies, procedures, rules, standards, regulations, and frameworks? Physical control Administrative control Logical control Soft token
Administrative control
Which type of user has complete and unrestricted access to the computer/domain? Standard users Administrators Power users Guest users Submit
Administrator
When going over the wireless settings, why is it recommended to change the default SSID? To be able to see what devices people in other networks use Anybody from outside your network will be able to figure out what devices you are using and what they could attack To be able to share your devices with others within your network To be able to share the devices you are using with others outside your network
Anybody from outside your network will be able to figure out what devices you are using and what they could attack
Which feature can be disabled to stop the automatic installation of files and programs from USB devices? AutoRun UPnP AutoPlay PnP
Autorun
Changing the default setting of which of the following will help strengthen the PC's security during the bootup process? Disable AutoRun BIOS/UEFI Password Disable AutoPlay Safe Mode Msconfig
BIOS/UEFI Password
In which type of encryption does the Trusted Platform Module (TPM) on the motherboard store a copy of the encryption keys? BitLocker BitLocker-To-Go EFS Hashing
Bitlocker
What is the purpose of the Emergency Access tool? Give access to another user Get access from another user Both of these Neither of these
Both of these
Which of the following may cause an application to fail to launch on a mobile device? You have not used the application for a long time Your friend is also using the application on their mobile device using their own user account The mobile device is charging Certain permissions have been disabled
Certain permissions have been disabled
Which of the following can you do if an application crashes? [Choose all that apply] Ignore the issue Clear the cache Clear the application data Uninstall and reinstall the application
Clear the cache Clear the application data Uninstall and reinstall the application
The basic principles of security are known as the CIA triad. Which of the following does the CIA stand for? Confidentiality, Intellectual, Availability Confidentiality, Informal, Availability Confidentiality, Internal, Availability Confidentiality, Integrity, Availability
Confidentiality, Integrity, Availability
Which of the following would be the best way to ensure that devices on your network do not gain access to certain websites containing specified words? Content Creation Content Deleting Content Filtering Content Enabling
Content Filtering
Which of the following are easily researchable and should be immediately changed upon setting up a device? Screened Subnet UPnP Default Passwords Firmware
Defaults Passwords
Which of the following tools can you use to complete full drive encryption? SystemVault MacVault FolderVault FileVault
FileVault
Which of the following are IP Filtering techniques? [Choose all that apply] Firewall Filtering Email Filtering Route Filtering Password Filtering
Firewall Filtering Email Filtering Route Filtering
For what reason may it be important to have a backup of your files? To be able to share your files with friends To increase memory space on your computer To decrease hardware storage For altered or missing files
For altered or missing files
Which browsing feature in Microsoft Edge keeps your browsing confidential on the device being used? Ghostery Pop-Up Blocker Extensions InPrivate Browsing
InPrivate Browsing
Which zones are available on the Internet Properties - Security tab? [Choose all that apply] Local Intranet Internet Secure Sites Trusted Sites Restricted Sites
Internet Local intranet trusted sites Restricted Sites
Which of the following is the purpose of Mission Control? It allows you to mirror your screen with another Apple device It allows you to view how many Apple devices you have connected to your network It allows you to view all your open windows and applications and switch between them It allows you to close down your system
It allows you to view all your open windows and applications and switch between them
Which of the following locks can be used to tether a PC to a desk? The mechanism attaches itself to the frame of the PC. Screen Lock Bike Lock Kensington Lock Laptop Safe
Kensington Lock
Which of the following are Multifactor Authentication (MFA) factors? [Choose all that apply] Possession-based Location Knowledge-based Behavioral Profession Biometrics
Knowledge-based Possession-based Biometrics Location Behavior
In File Finder, where would you find the Close, Minimize, and Maximize options? Left-hand side Top Right-hand side Bottom
Left-hand side
what is the scope of the changes you made in this lab? local machine only all logins from any source any sso login all of these are true - wrong
Local Machine only
which system image did you install on your emulated phone? Pie Android 9.0 Pie Android 8.1 Oreo Android 8.1 Oreo Android 8.0
Oreo Android 8.1
What should be enabled on switches to prevent unauthorized access from threat actors? PnP AutoPlay Port Security AutoRun
Port security
Which security control requires users, devices, and applications to be given only the minimum level of permissions that are necessary to complete the task? Multifactor Authentication (MFA) Access Control Lists (ACL) Principle of Least Privilege Hard token
Principal of least privilege
Which type of connection is initiated by the technician with a code that is given to the user to input? A series of permissions checks occur, and the user and technician will be connected. VNC Remote Assistance Quick Assist RDP
Quick Assist
In which of the following remote connection will a user request help from a technician with an invitation and a password to help secure the connection? Quick Assist OpenSSH Remote Assistance Remote Desktop Protocol
Remote Assistance
Which of the following is a built-in Windows tool that allows a user to connect to a computer remotely as if they were sitting right in front of it, and only one connection can be made at a time? VNC Remote Assistance Quick Assist Remote Desktop Protocol
Remote Desktop Protocol
Which of the following tricks you about a virus being present on your system and then asks you to use it in order to be able to clean it? Anti-malware SPAM Rogue Antivirus Pop-up
Rogue Antivirus
Which network devices rely on Access Control Lists (ACL) to permit network connections? [Choose all that apply] Router Switch Printer Firewall Server
Routers switches firewalls
Which of these is not an Email domain authentication method? [Choose all that apply] DKIM S/MIME DMARC SPF TLS
S/MIME TLS (SPF, DKIM, and DMARC are Email domain authentication methods.)
Which of the following methods is used to deliver an unwanted E-Mail sent to several users at once? Anti-malware Rogue Antivirus SPAM Pop-up
SPAM
Which of the following remote access technology allows administrators the ability to remotely administer computers via the command line? Telnet SSH VNC RDP
SSH
Which mobile security feature ensures that the device will not be vulnerable to attacks? Security Update Encryption Lock Screen Location
Security Update
Which of the following does SOHO stand for? Small Option Home Office Small Operating Home Office Small Office Help Office Small Office Home Office
Small Office Home Office.
Which of the following tools can you use to search for things on your MAC computer? All Search Options Search Spotlight Search Tool Search
Spotlight Search
Which of the following does Disk Utility allow you to manage? Storage devices that are internal to the machine Users who have access to the machine Documents that you have saved onto the machine External peripherals
Storage devices that are internal to the machine
Which one of the following Screen lock options is not secure? Pattern Password PIN Swipe
Swipe
Which of the following may help to prolong the battery life? [Choose all that apply] Playing games on your device Turning on airplane mode Turning on battery-saving mode Dimming the screen
Turning on airplane mode Turning on battery-saving mode Dimming the screen
Which of the following is a set of protocols and technologies that enable devices to discover and connect to one another automatically? Screened Subnet DHCP PnP UPnP
UPnP
The changes you made in the local group policy editor apply to which of the following? All users on local machine network -wrong selected users only users of this pc only administrator and guest -wrong
Users of this PC only
Which of the following is a secure connection with encryption and authentication that encapsulates packets and creates tunnels? OpenSSH Virtual Private Network VNC SSH
Virtual Private Network
In the Windows Security menu, which of the following would you click to find out if you are receiving an anti-malware alert for something you had previously quarantined? Virus & Malware Checker Virus & Threat Checker Virus & Threat Protection Virus & Malware Protectio
Virus & Threat Protection
Which of the following Microsoft application helps protect networks against security attacks and helps to minimize the attack surface by adding another layer to the defense in depth approach? Windows Defender Firewall NTFS Microsoft Defender Antivirus Intrusion Detection System (IDS)
Windows Defender Firewall
Which Wi-Fi standard encrypts information packets as they are sent out from the access point or wireless network card using the RC4 stream cipher algorithm? Wi-fi Protected Access 2 (WPA2) Wired Equivalent Privacy (WEP) Wi-fi Protected Access (WPA) Wi-fi Protected Access 3 (WPA3)
Wired Equivalent Privacy (WEP)
For which of the following reasons is root user access usually locked on phones? To prevent you from using the phone You don't usually need to do things on phones that require administrator access It will allow you to disable permission on all apps To prevent you from downloading apps from a trusted source
You don't usually need to do things on phones that require administrator access
How did you access the Command prompt in the lab typing cmd in the search bar and clicking the best match right click start and choose the command prompt clicking in the search bar and choosing command prompt all of these
all of these
how did you locate your device ? used android/find used geoloaction heard it ringing all of these
all of these
what action should you take to ensure the changes you made in the local group policy editor persists? Restart PC Enter gpupdate at the command prompt Enter gupdate / force at the command promt all of these
all of these
what was the result when you entered the touch myfile command ? no observable output new bank file was created in the pwd no error reported all of these
all of these
which of these choices are required to create an apple id? unique username password internet connection all of these
all of these
why would ls -l command be preferable to the ls command when examining a directory? - It displays the file and directory attributes - it displays file and directory ownership - It displays file and directory sizes - all of these are correct
all of these are correct
what action can you take when your account gets locked? call the administrator wait five minutes and try again login as admin and unlick account any of these would work
any of these would work
Which of the following are stored by browsers to enhance the user experience? They can store information like what we put in our shopping carts but can also be a security concern due to session hijacking. Favorites Cookies Extensions Keeper Password Manager & Digital Vault Submit
cookies
how did you access the app? google browser edge browser download any of these
edge browser
Which of the following can be added in Microsoft Edge to customize or add to its features? Collections Favorites Sync Extensions
extensions
which button on the emulated phone was used to shut it off? avd manager external toolbar power button power button on phone none of the choices are correct
external toolbar power button
Which section of the emulated interface did you launch your browser from ? apps app drawer favorites tray navigation bar
faavorite tray
to create an account in LastPass you need to use your personal email true false
false
what actions were not completed with the net use command? create the share wrong delete the share wrong find the share none of these wrong
find the share
where did you get the app used in the lab? google.com/find/android iCloud.com/find iTunes.com/android/locator google.com/android/find
google.com/android/find
according to your linux general commands manual, which command will display the built-in tool documentation when used with the dt command ?
help
which command did you use to find the name of the host computer ?
hostname
which command did you use to find your server's IP address ? - ping - ipconfig - ifconfig -netstat
ifconfig
In a macOS dock which icon will display all currently open apps? Launchpad wrong Finder Applications wrong Mission Control
mission control
which toolbar contains the back button located on your emulated phone? apps app drawer favorite tray navigation bar
navigation bar
what file path was necessary when you created you new myfile in the lab? absolute wrong relative wrong none relational
none
which special options did you select when you were installing android studio ? Intel HAXM Hyper-V Both of these none
none
what label did windows assign to your Z: volume when you typed the dir command? E8FF-0307 MyShare Z:MyShare none of these
none of these
which command did you use to see the myfile file you created touch cd / df my file none of these
none of these
Which browser download option did you choose on the download status bar when you download the android studio? Always open files of this type open when done show in folder none of these
open when done
which permissions were applied to all users ?
read/write
what should you do when you are sure that your device is lost for good? remote lock remote wipe remote encryption all of these-wrong
remote wipe
what does the / represent in the command cd /etc? display root directory up one level all of these
root directory
what launches when you hold down the shift key at startup? Apple Diagnostics Startup Manager Safe Mode None of these
safe mode
which device are you trying to locate ? smartphone ipod macbook none of these
smartphone
your backup media is not currently connected. the time machine will still create backups while not connected. what are these called? backups points safe times snapshots
snapshots
which choice is NOT a minimum requirement to create your password? Number Lower case Upper case Special character
special characters
which console identifies the utility that opens a command line interface in the macOS konsole console terminal controller
terminal
what operating system is the macOS Terminal based on ? Linux UNIX MS-DOS none of these
unix
will gpedit.msc work on a Windows domain controller ? no, use sepol.msc yes only on Win 10 and later yes, no issues all of these - wrong
yes no issue