Chapter 16 - Missed Questions
You need to make sure that old application data is not still located on a Windows 10 computer. Which hidden folder in Windows 10 stores this data?
%systemdrive%\Users\user_name\AppData
You are working as a desktop technician in an organization. Adam reports that some unauthorized users are accessing his email messages. He also reports that he received an email from an unauthorized user requesting confidential information about his bank account. What should you suggest Adam do? (Choose two.)
Delete the email message received from unauthorized users. To protect email messages from unauthorized users, you should encrypt the contents and attachments of all the outgoing messages.
After determining the scope of a user's job, what is the next step in implementing the principle of least privilege?
Determine the minimum set of privileges needed to perform the user's job.
Which of the following is based on the security concept of "something you have"? (Choose all that apply.)
Door lock Hardware token Server lock
While performing preventative maintenance on a user's computer, you notice several files that violate the Acceptable Use Agreement the user signed when initially employed by the company. The IT department has specific policies for dealing with any violations. What should you do?
Follow the procedures for dealing with this violation.
What is the best implementation of the principle of least privilege?
Issuing the Run as command to execute administrative tasks during a regular user session.
Your company has adopted a new security policy that states that all computers must be locked if a user leaves his desk for any reason. What is the quickest way to lock a Windows 10 computer?
Press the Windows + L keys.
You need to configure the UAC: Behavior of the elevation prompt for administrators group policy in a highly secure environment for Windows 10 computers. Which group policy setting should you use?
Prompt for credentials on the secure desktop
Several users will be using a new Windows 10 computer. You have been asked to configure the accounts in the appropriate manner to maximize security. Which procedures should you implement? (Choose all that apply.)
Rename the Administrator account. Rename the Guest account. Disable the Guest account.
You need to harden a new operating system (OS) immediately after installation. Which configuration change should you made?
Rename the administrator account and disable and rename the guest accounts.
You suspect that a Windows 10 computer has been infected with a Trojan horse. You need to determine if any Trojan horses are loading at system startup and remove them. Which tool should you use to find out if any Trojan horses are being loaded at startup?
Settings
Edith and Clarence are studying for their A+ exam and want to learn more about NTFS permissions versus share permissions on Windows 10 computers. Which of the following statements is FALSE?
Share permissions include Read, Write, Modify, and Full Control.
A user contacts you stating that he believes that his computer is infected with malware. Which symptoms may indicate that he is correct? (Choose all that apply.)
The following symptoms may indicate that a computer is infected with malware: pop-ups browser redirection security alerts slow performance
Vivian wants to set permissions on a certain folder to allow users to modify data. What is she really allowing them to do with this type of permission?
The user can read, write, execute, and delete everything, including the folder.
Daniel, a member of the board of directors for your company, has called the help line to complain that an unknown person is posting to his account on his favorite social media site pretending to be him. After discussing the problem, he reveals that he performed the steps as dictated by last week's email from your department. Your department did not send out an email last week with steps to complete. What term(s) below best describe which attack most likely occurred? (Choose all that apply.)
Whaling or spear phishing most likely occurred. Whaling and spear phishing are two types of targeted phishing attacks.
You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security while providing support for older wireless clients. Which protocol should you choose?
Wi-Fi Protected Access (WPA)
You are researching biometrics for identification and verification of employees in an organization. Which attributes or details of an employee can be used by biometric devices? (Choose all that apply.)
You can use the following attributes of a person to recognize the person through the use of biometric devices: Fingerprints Palmprint Face Signature Iris Retina Hand geometry Voice
You need to defragment a hard drive. When the defragmentation is complete, you want to view both the analysis and defragmentation reports. Which command should you run?
defrag /v
Recently several employees email accounts were hacked after they visited the local coffee shop and used their mobile devices there. Which type of attack most likely occurred?
shoulder surfing
According to your company's new security policy, the administrator must define the number of days that a password can be kept before the user can change it. Which password policy setting should the administrator use?
the Minimum password age setting