Finals Exam

Ace your homework & exams now with Quizwiz!

which of the following includes which user, device, or program has access to a particular resource, such as a printer, folder, or file on a corporate network or computer ?

Access Control List.(ACL)

which of the following locks could be used to identify a person by her fingerprint, handprint, face, retina , iris, voice, or handwritten signature?

Biometric Lock

Which of the following encryption (ONLY AVAILABLE) in windows professional and business editions locks down a hard drive by encrypting the entire windows volume on the drive and restricts access by requiring one or two encryption keys ?

BitLocker Encryption

which of the following tries every single combination of characters until it discovers your password?

Brute Force Attack

which of the following passwords could be used as a strong Password?

C0d12367$

which of the following locks could be used to secure a laptop or other computer to a table so someone can't walk away with it?

Cable Lock

which of the following Tabs allows you to configure proxy server settings and create a VPN (Virtual Private Network?)

Connection Tab

You have completed the windows troubleshoot process: what is the ABSOBLUTE LAST step in the process that should be performed?

Document What Happened

which of the following Social Engineering attacks have occurred when a person is looking for useful information in someone's trash to help create a convincing impersonation of an individual or company to aid in a malicious attack?

Dumpster Diving

There are 9 steps to windows Trouble shooting startup process. please identify what happenes when 2 or F2 is press?

Enable Boot Logging

There are 9 steps to windows Trouble shooting startup process. please identify what happenes when 1 or F1 Press

Enable Debugging

There are 9 steps to windows Trouble shooting startup process. please identify what happenes when 3 or F3 is press?

Enable Low-Resolution Video (640? 480)

There are 9 steps to windows Trouble shooting startup process. please identify what happenes when 4 or F4 is press?

Enable Safe-Mode

There are 9 steps to windows Trouble shooting startup process. please identify what happenes when 5 or F5 is press?

Enable Safe-Mode with Networking

Which of the following Windows Files System allows the user to Encrypted file and folders?

Encrypting File System (EFS)

In order to successfully pass the A+ 1002 (Core 2 Exam ) the candidate must score a 750 or better.

False

Many software companies, including Microsoft have implemented measures to control the use of their software which is called GDPR (general data protection Regulation)

False

The macOS is built on a LINUX Platform d

False

There are eight (8) step to the step-by step attack plan to clean u[ an infected system

False

True or False A Soft boot or warm boot involves turning on the power with the on/off switch.

False

True or False A. hard boot or cold boot involves using operating system to reboot

False

True or False AD Certification services (AD CS) secure. AD Certification services (AD CS) secures trust relationships with outside organizations.

False

True or False AD Federation services (AD FS) secure. AD Federation services (AD FS) secures identities of services, computer and users.

False

which of the following performs a clean installation of the most recent version of windows 10 and is often used to remove manufacturer bloatware?

Fresh Start

which of the following Tabs allows you to change the home page or add a second home page tab? you can protect your identity and when surfing records.

General Tab

which of the following works in Active Directory on a window domain, to control the privileges of computers and user on that domain?

Group Policy

which of the following groups has limited privileges on the system and is given a temporary profile that is deleted when the user signs out?

Guest User Group

Which of the following contains a subset of policies in Group policy this subset applies only to the local computer or local user?

Local Group Policy

which of the following allows you to specify how many MAC addresses a port can accept or to provide a whitelist of MAC addresses the switch will accept?

MAC Address Filtering

which of the following Social Engineering attacks have occurred when the sender of an email hoax scams you into responding with personal data about yourself?

Phishing

which of the following locks could be used to restrict physical access to the exposed ports?

Port Lock

which of the following could be used to control which devices can use any port or a specific port on the switch?

Port Security

which of the following groups can (ONLY) be found in older editions of windows and can read from and write to parts of the system other than its own user profile folders, install application, and perform limited administrative tasks?

Power User Group

You as the support technician, will be responsible to make sure the user account assigned to the employee has these privileges and no more. What is this approach called?

Principle of Least Privilege

which of the following malicious attacks holds your computer system hostage until you pay money?

Ransomware

which of the following partitions are on the hard drive that contains a copy of the Os build, diagnostics programs, and reinstalled applications needed to restore the system to its factory state?

Recovery Partition

which of the following malicious attacks loads itself before the OS boot is complete. It can hide in boot managers, boot loader programs or kernel mode device drivers?

Rootkit

which of the following Social Engineering attacks have occurred when other people secretly peek at your monitor screen as you work?

Shoulder Surfing

which of the following malicious attacks collect personal information that it transmits over the internet to web-hosting sites?

Spyware

which of the following password combinations protection strategies should be used to not make it easy to guess the password either by people or by computer programs using various programming methods?

Strong Password

which of the following Social Engineering attacks have occurred when an unauthorized person follows an employee through a secured entrance to a room or building?

Tailgating

which of the following malicious attacks does not need a host program to work, rather, it substitutes itself for a legitimate program?

Trojan

In order to successfully pass the A+1002 (Core 2 exam ) the candidate must score a 700 or better

True

Many software companies, including Microsoft have implemented measures to control the use of their software, which is called digital rights management (DRM)

True

The MacOs is build on a UNIX Platform

True

True or False A hard boot, or cold boot involves A hard boot, or cold boot involves turning on the power with the on/off switch

True

True or False A soft boot or warm boot, involves using the operating system to reboot

True

True or False AD Certificate services (AD CS) AD Certification services (AD CS) secures identities of services, computers and users.

True

True or False AD Federation services (AD FS) secure.. AD Federation services (AD FS) secure trust relationships with outside organizations

True

true or false There are seven (7) steps to the step There are seven (7) steps to the step-by- step attack plan to clean up an infected system

True

which of the following commands could be used to modify the boot configuration data file in windows?

bcdedit

If startup repair does not fix the problem, which of the following commands could be used to repair the Boot Configuration Data tile and boot sectors ?

bootrec

which fo the following commands allows take user to copy a file?

cp.

which of the following commands allows the user to troubleshoot problems with tcp/ip network connections?

ifconfig

which of the following allows the user to move a file or rename it, if the source and destination are the same directory ?

mv.

which of the following commands shows the name of the current of present working directory?

pwd.

which of the following commands allows the user to remove or delete the file or files that are specified?

rm.

which of the following commands allows the user to automatically shut down the system?

shutdown.

which of the following commands (when logged in as a normal user) grants right to use root command; otherwise know as superuser?

sudo.

which of the following malicious attacks copies itself throughout a network or the internet without a host program?

worm


Related study sets

AcDec Art Section 1: Art Fundamentals

View Set

Chapter 22 Poisoning and Drug Abuse

View Set

تاريخ وحدة الانجازات السياسية للملوك الهاشميين في الأردن

View Set

Nutrition Test 2- chap 4, 5, 6, 7, & 8

View Set