CompTIA A+ 220-1002_3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following provides physical security measure against laptop theft? * Cable lock * Trusted Platform Module (TPM) * Geotracking * LoJack for Laptops

Cable lock

What is the function of the Linux chmod command? * Changes file access permissions * Changes file owner and group permissions * Compares the contents of two files or sets of files * Changes the Linux command prompt

Changes file access permissions

What is the function of the Linux chown command? * Changes the Linux command prompt * Compares the contents of two files or sets of files * Changes file owner and group permissions * Changes file access permissions

Changes file owner and group permissions

Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows? * Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings * Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings * Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings * Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings

Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows? * Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings * Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings * Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings * Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings

A type of transmission that takes place in two directions simultaneously is known as: * Full duplex * Broadcast * Half duplex * Multicast

Full duplex

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings. * Local Users and Groups * Resource Monitor * Group Policy * User Account Control (UAC)

Group Policy

Which of the following firewall types would provide the best protection for an ingress/egress point of a corporate network? (Select 2 answers) * Hardware firewall * Network-based firewall * Software firewall * Host-based firewall

Hardware firewall Network-based firewall

Which of the following is a common firewall type used for protecting a single computer? (Select 2 answers) * Host-based firewall * Software firewall * Network-based firewall * Hardware firewall

Host-based firewall Software firewall

Examples of secure network protocols used for establishing VPN connections include: (Select 2 answers) * IPP * WEP * IPsec * HTTP * TLS

IPsec TLS

Which of the following are examples of hardware tokens? (Select 3 answers) * Key fob * Cable lock * Passphrase * Biometric reader * RFID badge * Smart card

Key fob RFID badge Smart card

A password management system in macOS is known as: * Kerberos * Credential Manager * BitLocker * Keychain

Keychain

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user. * MDM policy * Login script * Group Policy * Directory permissions

Login script

What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network? * MAC address filtering * Network Address Translation (NAT) * Static IP addressing * Network Access Control (NAC)

MAC address filtering

Which type of software enables a centralized administration of mobile devices? * MFA * MMC * MDM * MFD

MDM

A macOS system feature providing single-screen thumbnail preview of all open windows and applications is known as: * Spotlight * Mission Control * Screen Sharing * Desktop Window Manager

Mission Control

Which of the following statements are true? (Select 2 answers) * NTFS permissions apply only to local users * NTFS permissions can be applied only on a folder level * NTFS permissions apply to both network and local users * NTFS permissions can be applied to a folder or individual file

NTFS permissions apply to both network and local users NTFS permissions can be applied to a folder or individual file

If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking place: * Only in one direction at a time * In both directions at half the speed * In one direction at half the speed * In both directions simultaneously

Only in one direction at a time

Protection provided by security guards is an example of: * Technical security control * Physical security control * Administrative security control * Logical security control

Physical security control

A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as: * MicroSD card * Common Access Card (CAC) * Proximity card * Personal Identity Verification (PIV) card

Proximity card

Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic? * Measured service * Acceptable Use Policy (AUP) * Fair access policy * Quality of Service (QoS)

Quality of Service (QoS)

A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called: * Smart card * ID badge * Soft token * RFID badge

RFID badge

Which of the macOS features enables access to optical drive of another computer over a network? * Remote Disk * Dock * Boot Camp * Remote Disc

Remote Disk

Which of the following built-in macOS tools enables remote access to another Mac computer? * Screen Sharing * Remote Desktop Protocol (RDP) * GoToMyPC * Remote Assistance

Screen Sharing

A type of user interface that enables the execution of operating system commands is commonly referred to as: * GUI * Shell * CLI * Terminal

Shell

An antivirus database entry used for identifying malicious code is known as virus: * ID * Record * Signature * Repository

Signature

Which of the following answers refers to an example implementation of certificate-based authentication? * Smart card * ID badge * PIN code * Biometric lock

Smart card

Which of the following macOS features allows to create switchable desktop environments? * Spaces * Personalization * Display * Aero

Spaces

Which of the following is a macOS system search utility? * Explorer * File explorer * Spotlight * Finder

Spotlight

Which of the following system utilities provides access to different command-line shells in macOS? * cmd.exe * PowerShell * command.com * Terminal

Terminal

A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege. True False

True

Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices. True False

True

In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas. True False

True

In IT security, the term "User authentication" refers to the process of proving user identity to a system. Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual, such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns such as keyboard typing style ("something you do"). Multi-factor authentication systems require implementation of authentication factors from two or more different categories. True False

True

In computer security, a type of small-factor physical device used for authentication is commonly referred to as a hardware token. True False

True

In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes. True False

True

In macOS, the term "local snapshot" refers to a backup copy of all personal and system files stored on the local machine instead of the preferred external drive. True False

True

One of the measures for securing networking devices is the practice of disabling unnecessary services and unused ports. True False

True

Which of the following is the best method to secure a small network lacking an authentication server? * WPA-PSK * WPA2-Enterprise * WPA2-PSK * WPA-Enterprise

WPA2-PSK

A solution that allows to turn on a network host remotely by sending a broadcast frame is called: * Remote access * Jumbo frame * Backdoor access * Wake-on-LAN

Wake-on-LAN

Which of the following is a set of firewall entries containing information on traffic considered safe enough to pass through? * Whitelist * Routing table * Blacklist * MAC address table

Whitelist

Which of the following terms describes a large network of Windows-based PCs under single administration? * HomeGroup * Windows domain * Active Directory * Workgroup

Windows domain

What is the name of a software tool used for finding and installing software packages on Debian and Debian-based Linux distributions? * RPM * apt-rpm * Yum * apt-get

apt-get

Which of the following Linux command-line commands enables directory traversal? * cd * dir * ps * dig

cd

Which Linux command enables copying files and directories? * cp * copy * xcopy * robocopy

cp

A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called: * fsutil * diskpart * dd * format

dd

A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called: * rm * chmod * find * grep

grep

A service that enables storage of data on Apple cloud servers is called: * iCloud * Remote Disk * OneDrive * Dropbox

iCloud

A Linux command-line utility used for displaying and modifying network interface configuration settings is called: * ifconfig * net config * ipconfig * networksetup

ifconfig

Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication? * net config * ifconfig * networksetup * iwconfig

iwconfig

Which of the Linux command-line commands allows to terminate a running process? * taskkill * exit * shutdown * kill

kill

Which of the following Linux commands is used to display information about files and directories contained within the current working directory? * pwd * ls * grep * ps

ls

Time Machine is a built-in backup utility for: * Linux * macOS * Windows * Other

macOS

What is the name of the Linux command used for renaming files and directories? * rm * ps * mv * ls

mv

Which of the following is a Linux command for transferring files/directories to a different directory? * replace * export * move * mv

mv

A Linux command-line command allowing a user to change his/her own password is known as: * pwd * pass * passwd * password

passwd

What is the name of a Linux command-line utility used for displaying statistics of running processes? * ps * tasklist * nbtstat * id

ps

A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called: * mv * pwd * rm * dir

pwd

A command-line command in Linux used for deleting files and directories is known as: * erase * rm * del * edit

rm

The following command can be used for turning off or restarting a Linux host. * reboot * shutdown * exit * taskkill

shutdown

Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account? * sync * id * usermod * su

su

A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called: * id * sudo * usermod * su

sudo

Which of the following commands is used for invoking a text editor in Unix-like operating systems? * edit * notepad * vi * bcdedit

vi

Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment? * Boot Camp * VirtualBox * Hyper-V * VMware Player

Boot Camp

A rule-based access control mechanism implemented on routers, switches, and firewalls is known as: * ACL * CSR * DLP * AUP

ACL

Which of the following is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object? * DLP * NAT * ACL * DEP

ACL

Which of the following is a package management system most often used on Debian and Debian-based Linux distributions? * KDE * APT * Yum * RPM

APT

What is the function of a laptop's smart card reader? * Storage expansion * Access control * Theft prevention * Data encryption

Access control

A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as: * HomeGroup * Active Directory * Workgroup * Windows domain

Active Directory

The App Store menu in macOS provides access to: * Driver updates * Firmware updates * Antivirus updates * Anti-malware updates * All of the above

All of the above

Which of the following can be used by system/network administrators to restrict a user's ability to install software? * AUP * Group Policy * Principle of least privilege * MDM solutions * All of the above

All of the above

Which of the following is an example of a soft token? * USB token * Authenticator app * Smart card * Key fob

Authenticator app

Which of the following locations in macOS provides access to application updates menu? * Explorer * App Store * iCloud * Spotlight

App Store

Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)? (Select 2 answers) * Apple menu -> System Preferences... -> Mouse * Apple menu -> App Store... -> Categories -> Devices -> Trackpad * Apple menu -> System Preferences... -> Devices -> Mouse * Apple menu -> System Preferences... -> Trackpad * Apple menu -> App Store... -> Categories -> Devices -> Mouse * Apple menu -> System Preferences... -> Devices -> Trackpad

Apple menu -> System Preferences... -> Mouse Apple menu -> System Preferences... -> Trackpad

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network? * DRP * DHE * DLP * DEP

DLP

Which of the following is a macOS disk maintenance tool? * defrag * Disk Cleanup * Disk Management * chkdsk * Disk Utility

Disk Utility

Which of the following macOS utilities allows to create/restore a disk image? * App Store * Disk Utility * Time Machine * System Restore

Disk Utility

What is the name of a macOS equivalent of Windows Taskbar? * Explorer * Dock * Spotlight * Finder

Dock

What type of preventive physical access controls would provide a basic means for securing door access? (Select 3 answers) * Motion detection * Lighting * Door lock * CCTV * Proximity card reader * Smart card reader

Door lock Proximity card reader Smart card reader

Which of the following allows to create a backup copy of the entire contents of a disk drive (which may include a pre-configured OS installation) and replicate the drive to a new computer? * Clean install * In-place upgrade * Repair installation * Drive imaging

Drive imaging

Which of the following logical security controls provides a countermeasure against unsolicited electronic messages (a.k.a. spam)? * Mail relay * Host-based firewall * Email filtering * SMTP server

Email filtering

In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first: * Updated with the latest driver * Verified against the Hardware Compatibility List (HCL) * Checked with a loopback plug * Enabled in the advanced BIOS settings menu

Enabled in the advanced BIOS settings menu

An antivirus software is kept up to date via: (Select 2 answers) * Driver updates * Application updates * Engine updates * OS updates * Virus signature updates

Engine updates Virus signature updates

In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files. True False

False

A macOS file manager application is known as: * Konqueror * Explorer * Finder * Nautilus

Finder

Which of the following macOS utilities can be used for detecting and repairing disk-related problems? * chkdsk * Disk Utility * Disk Management * First Aid (in Disk Utility)

First Aid (in Disk Utility)

Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location? * Folder redirection * Local Users and Groups * User Account Control (UAC) * Directory permissions

Folder redirection

An unresponsive application/process in macOS can be terminated with the use of: * Alt + F4 * taskkill command * Force Quit * shutdown command

Force Quit

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app). True False

True

Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing. True False

True

The term "Mantrap" refers to a physical security access control system used to prevent unauthorized users from gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door. True False

True

USB locks are mechanical devices used for blocking a computer's USB ports from unauthorized access. USB locks can also be used to prevent the removal of an external USB device attached to the computer. True False

True

VPN connection types are divided into remote-access VPNs (used for connecting a computer to a network), and site-to-site VPNs (used for connecting networks). True False

True

Virus definition database files contain detection patterns for known viruses. To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature. True False

True

Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU. True False

True

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three. True False

True

Which of the following ensures the privacy of a VPN connection? * Hashing * Tunneling * Authentication * Packet inspection

Tunneling

Which of the following is a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface? * VTP * VRF * VTC * VNC

VNC

Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet? * VPN concentrator * Proxy server * Distributed switch * UTM appliance

VPN concentrator

Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws? * EAP * AES * WPA2 * WEP

WEP


Set pelajaran terkait

Business Analytics Cumulative Final - Practice Problems

View Set

Ev.- Maternity and Women's Health Nursing

View Set

Macro Final: Short Answers and HWK 4

View Set

Cisco Computer Support & Service (CSS)

View Set

Mark Twain and Regionalism Study Guide

View Set