ITN 106 Finals

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which browsing feature in Microsoft Edge keeps your browsing confidential on the device being used? Ghostery Pop-Up Blocker Extensions InPrivate Browsing

InPrivate Browsing

why would ls -l command be preferable to the ls command when examining a directory? - It displays the file and directory attributes - it displays file and directory ownership - It displays file and directory sizes - all of these are correct

all of these are correct

what action can you take when your account gets locked? call the administrator wait five minutes and try again login as admin and unlick account any of these would work

any of these would work

which button on the emulated phone was used to shut it off? avd manager external toolbar power button power button on phone none of the choices are correct

external toolbar power button

what file path was necessary when you created you new myfile in the lab? absolute wrong relative wrong none relational

none

which special options did you select when you were installing android studio ? Intel HAXM Hyper-V Both of these none

none

what label did windows assign to your Z: volume when you typed the dir command? E8FF-0307 MyShare Z:MyShare none of these

none of these

Which browser download option did you choose on the download status bar when you download the android studio? Always open files of this type open when done show in folder none of these

open when done

How many characters are considered secure in LastPass? 8 10 12 16

12

What's the port number for Hypertext Transfer Protocol Secure (HTTPS)? 80 143 389 22 433

433

How many devices are using the RDP protocol? 13 7 6 5

5

What is the purpose of the Emergency Access tool? Give access to another user Get access from another user Both of these Neither of these

Both of these

Which of the following are IP Filtering techniques? [Choose all that apply] Firewall Filtering Email Filtering Route Filtering Password Filtering

Firewall Filtering Email Filtering Route Filtering

For what reason may it be important to have a backup of your files? To be able to share your files with friends To increase memory space on your computer To decrease hardware storage For altered or missing files

For altered or missing files

Which of the following is a set of protocols and technologies that enable devices to discover and connect to one another automatically? Screened Subnet DHCP PnP UPnP

UPnP

In which type of encryption does the Trusted Platform Module (TPM) on the motherboard store a copy of the encryption keys? BitLocker BitLocker-To-Go EFS Hashing

Bitlocker

Which of the following is a built-in Windows tool that allows a user to connect to a computer remotely as if they were sitting right in front of it, and only one connection can be made at a time? VNC Remote Assistance Quick Assist Remote Desktop Protocol

Remote Desktop Protocol

Which section of the emulated interface did you launch your browser from ? apps app drawer favorites tray navigation bar

faavorite tray

which device are you trying to locate ? smartphone ipod macbook none of these

smartphone

your backup media is not currently connected. the time machine will still create backups while not connected. what are these called? backups points safe times snapshots

snapshots

Which of the following is the purpose of Mission Control? It allows you to mirror your screen with another Apple device It allows you to view how many Apple devices you have connected to your network It allows you to view all your open windows and applications and switch between them It allows you to close down your system

It allows you to view all your open windows and applications and switch between them

Which of the following locks can be used to tether a PC to a desk? The mechanism attaches itself to the frame of the PC. Screen Lock Bike Lock Kensington Lock Laptop Safe

Kensington Lock

what is your servers IP address? Enter your answer in the space provided

10.0.2.15

How many live connections did you find in the lab ? 13 7 6 5

13

Which zones are available on the Internet Properties - Security tab? [Choose all that apply] Local Intranet Internet Secure Sites Trusted Sites Restricted Sites

Internet Local intranet trusted sites Restricted Sites

Which of the following may help to prolong the battery life? [Choose all that apply] Playing games on your device Turning on airplane mode Turning on battery-saving mode Dimming the screen

Turning on airplane mode Turning on battery-saving mode Dimming the screen

Which of the following can be done on the Internet Properties - Privacy tab? [Choose all that apply] Allow Cookies Deny Sites from asking for the physical location Allow Extensions Block Pop-ups

- Allowing/blocking cookies - Allow/deny sites from asking for the physical location - Allow/block pop-up - Allow/block extensions and toolbars when browsing privately

Which of the following permissions are available with the NTFS File system? [Choose all that apply] Modify Full Control Read and execute Write Read

- Full control - Modify - Read and execute - List folder contents - Read - Write

What is the reason for encrypting a mobile device's hard drive? [Choose all that apply] Prevent the device from being unlocked with a password or PIN Prevent unauthorized access to the data on the device Prevent the device's hard drive from being accessed when lost or stolen Prevent the access to the location of the device when lost or stolen

- Prevent the device's hard drive from being accessed when lost or stolen - Prevent unauthorized access to the data on the device

When can an Antivirus be disabled temporarily? [Choose all that apply] Concerns over privacy Optimizing your PC performance When installing another antivirus software onto the PC Interference with other applications

- When installing another antivirus software onto the PC - Interference with other applications - Optimizing your PC performance - Concerns over privacy

Which of the following will help prevent viruses from being downloaded onto your mobile device? Install anti-malware software on your device Download all files that are sent to you via an attachment Install spam software on your device Only download apps from a trusted installation source

-Install anti-malware software on your device - Only download apps from a trusted installation source

what ip address range did you scan for in the lab? 10.0.0.0 -254 10.0.0.1 -255 10.0.0.1 -254 all of these

10.0.0.1 -254

When going over the wireless settings, why is it recommended to change the default SSID? To be able to see what devices people in other networks use Anybody from outside your network will be able to figure out what devices you are using and what they could attack To be able to share your devices with others within your network To be able to share the devices you are using with others outside your network

Anybody from outside your network will be able to figure out what devices you are using and what they could attack

The basic principles of security are known as the CIA triad. Which of the following does the CIA stand for? Confidentiality, Intellectual, Availability Confidentiality, Informal, Availability Confidentiality, Internal, Availability Confidentiality, Integrity, Availability

Confidentiality, Integrity, Availability

Which of the following would be the best way to ensure that devices on your network do not gain access to certain websites containing specified words? Content Creation Content Deleting Content Filtering Content Enabling

Content Filtering

Which of the following would you use to secure a signal? [Choose all that apply] Device Names Encryption Authentication Network Name

- Encryption - Authentication

Which of the following Password policies are available on Windows 11? [Choose all that apply] Password must meet complexity requirements Minimum password age Maximum password age Enforce password history Maximum password length

- Enforce password history - Maximum password age - Minimum password age - Minimum password length - Minimum password length audit - Password must meet complexity requirements - Relax minimum password length limits - Store passwords using reversible encryption

Which of the following are examples of Remote Access Technologies? [Choose all that apply] 802.1 X TACACS WPA3 RADIUS Submit

- RADIUS - TACACS - 802.1 X

Which type of security control includes policies, procedures, rules, standards, regulations, and frameworks? Physical control Administrative control Logical control Soft token

Administrative control

Which type of user has complete and unrestricted access to the computer/domain? Standard users Administrators Power users Guest users Submit

Administrator

Which feature can be disabled to stop the automatic installation of files and programs from USB devices? AutoRun UPnP AutoPlay PnP

Autorun

Changing the default setting of which of the following will help strengthen the PC's security during the bootup process? Disable AutoRun BIOS/UEFI Password Disable AutoPlay Safe Mode Msconfig

BIOS/UEFI Password

Which of the following may cause an application to fail to launch on a mobile device? You have not used the application for a long time Your friend is also using the application on their mobile device using their own user account The mobile device is charging Certain permissions have been disabled

Certain permissions have been disabled

Which of the following can you do if an application crashes? [Choose all that apply] Ignore the issue Clear the cache Clear the application data Uninstall and reinstall the application

Clear the cache Clear the application data Uninstall and reinstall the application

Which of the following are easily researchable and should be immediately changed upon setting up a device? Screened Subnet UPnP Default Passwords Firmware

Defaults Passwords

Which of the following tools can you use to complete full drive encryption? SystemVault MacVault FolderVault FileVault

FileVault

Which of the following are Multifactor Authentication (MFA) factors? [Choose all that apply] Possession-based Location Knowledge-based Behavioral Profession Biometrics

Knowledge-based Possession-based Biometrics Location Behavior

In File Finder, where would you find the Close, Minimize, and Maximize options? Left-hand side Top Right-hand side Bottom

Left-hand side

what is the scope of the changes you made in this lab? local machine only all logins from any source any sso login all of these are true - wrong

Local Machine only

which system image did you install on your emulated phone? Pie Android 9.0 Pie Android 8.1 Oreo Android 8.1 Oreo Android 8.0

Oreo Android 8.1

What should be enabled on switches to prevent unauthorized access from threat actors? PnP AutoPlay Port Security AutoRun

Port security

Which security control requires users, devices, and applications to be given only the minimum level of permissions that are necessary to complete the task? Multifactor Authentication (MFA) Access Control Lists (ACL) Principle of Least Privilege Hard token

Principal of least privilege

Which type of connection is initiated by the technician with a code that is given to the user to input? A series of permissions checks occur, and the user and technician will be connected. VNC Remote Assistance Quick Assist RDP

Quick Assist

In which of the following remote connection will a user request help from a technician with an invitation and a password to help secure the connection? Quick Assist OpenSSH Remote Assistance Remote Desktop Protocol

Remote Assistance

Which of the following tricks you about a virus being present on your system and then asks you to use it in order to be able to clean it? Anti-malware SPAM Rogue Antivirus Pop-up

Rogue Antivirus

Which network devices rely on Access Control Lists (ACL) to permit network connections? [Choose all that apply] Router Switch Printer Firewall Server

Routers switches firewalls

Which of these is not an Email domain authentication method? [Choose all that apply] DKIM S/MIME DMARC SPF TLS

S/MIME TLS (SPF, DKIM, and DMARC are Email domain authentication methods.)

Which of the following methods is used to deliver an unwanted E-Mail sent to several users at once? Anti-malware Rogue Antivirus SPAM Pop-up

SPAM

Which of the following remote access technology allows administrators the ability to remotely administer computers via the command line? Telnet SSH VNC RDP

SSH

Which mobile security feature ensures that the device will not be vulnerable to attacks? Security Update Encryption Lock Screen Location

Security Update

Which of the following does SOHO stand for? Small Option Home Office Small Operating Home Office Small Office Help Office Small Office Home Office

Small Office Home Office.

Which of the following tools can you use to search for things on your MAC computer? All Search Options Search Spotlight Search Tool Search

Spotlight Search

Which of the following does Disk Utility allow you to manage? Storage devices that are internal to the machine Users who have access to the machine Documents that you have saved onto the machine External peripherals

Storage devices that are internal to the machine

Which one of the following Screen lock options is not secure? Pattern Password PIN Swipe

Swipe

The changes you made in the local group policy editor apply to which of the following? All users on local machine network -wrong selected users only users of this pc only administrator and guest -wrong

Users of this PC only

Which of the following is a secure connection with encryption and authentication that encapsulates packets and creates tunnels? OpenSSH Virtual Private Network VNC SSH

Virtual Private Network

In the Windows Security menu, which of the following would you click to find out if you are receiving an anti-malware alert for something you had previously quarantined? Virus & Malware Checker Virus & Threat Checker Virus & Threat Protection Virus & Malware Protectio

Virus & Threat Protection

Which of the following Microsoft application helps protect networks against security attacks and helps to minimize the attack surface by adding another layer to the defense in depth approach? Windows Defender Firewall NTFS Microsoft Defender Antivirus Intrusion Detection System (IDS)

Windows Defender Firewall

Which Wi-Fi standard encrypts information packets as they are sent out from the access point or wireless network card using the RC4 stream cipher algorithm? Wi-fi Protected Access 2 (WPA2) Wired Equivalent Privacy (WEP) Wi-fi Protected Access (WPA) Wi-fi Protected Access 3 (WPA3)

Wired Equivalent Privacy (WEP)

For which of the following reasons is root user access usually locked on phones? To prevent you from using the phone You don't usually need to do things on phones that require administrator access It will allow you to disable permission on all apps To prevent you from downloading apps from a trusted source

You don't usually need to do things on phones that require administrator access

How did you access the Command prompt in the lab typing cmd in the search bar and clicking the best match right click start and choose the command prompt clicking in the search bar and choosing command prompt all of these

all of these

how did you locate your device ? used android/find used geoloaction heard it ringing all of these

all of these

what action should you take to ensure the changes you made in the local group policy editor persists? Restart PC Enter gpupdate at the command prompt Enter gupdate / force at the command promt all of these

all of these

what was the result when you entered the touch myfile command ? no observable output new bank file was created in the pwd no error reported all of these

all of these

which of these choices are required to create an apple id? unique username password internet connection all of these

all of these

Which of the following are stored by browsers to enhance the user experience? They can store information like what we put in our shopping carts but can also be a security concern due to session hijacking. Favorites Cookies Extensions Keeper Password Manager & Digital Vault Submit

cookies

how did you access the app? google browser edge browser download any of these

edge browser

Which of the following can be added in Microsoft Edge to customize or add to its features? Collections Favorites Sync Extensions

extensions

to create an account in LastPass you need to use your personal email true false

false

what actions were not completed with the net use command? create the share wrong delete the share wrong find the share none of these wrong

find the share

where did you get the app used in the lab? google.com/find/android iCloud.com/find iTunes.com/android/locator google.com/android/find

google.com/android/find

according to your linux general commands manual, which command will display the built-in tool documentation when used with the dt command ?

help

which command did you use to find the name of the host computer ?

hostname

which command did you use to find your server's IP address ? - ping - ipconfig - ifconfig -netstat

ifconfig

In a macOS dock which icon will display all currently open apps? Launchpad wrong Finder Applications wrong Mission Control

mission control

which toolbar contains the back button located on your emulated phone? apps app drawer favorite tray navigation bar

navigation bar

which command did you use to see the myfile file you created touch cd / df my file none of these

none of these

which permissions were applied to all users ?

read/write

what should you do when you are sure that your device is lost for good? remote lock remote wipe remote encryption all of these-wrong

remote wipe

what does the / represent in the command cd /etc? display root directory up one level all of these

root directory

what launches when you hold down the shift key at startup? Apple Diagnostics Startup Manager Safe Mode None of these

safe mode

which choice is NOT a minimum requirement to create your password? Number Lower case Upper case Special character

special characters

which console identifies the utility that opens a command line interface in the macOS konsole console terminal controller

terminal

what operating system is the macOS Terminal based on ? Linux UNIX MS-DOS none of these

unix

will gpedit.msc work on a Windows domain controller ? no, use sepol.msc yes only on Win 10 and later yes, no issues all of these - wrong

yes no issue


संबंधित स्टडी सेट्स

Chapter 24 Nation Building and Economic Transformation in the Americas, 1800-1900

View Set

A+ Core 1 Practice Exam #4 (220-1101)

View Set

Portable Fire Extinguisher Safety.

View Set

BUILDING CONSTRUCTION: Chapter 4

View Set

ATG 268 Business Ethics Final Exam

View Set

Chapter 42: Drugs Used to Treat Glaucoma and Other Eye Disorders

View Set

Contingencies, Addenda, and Amendments +Financing Real Estate (Texas Pre-License - Law Of Contracts)

View Set

pre Class 11 - intro to muscle structure and function

View Set