Finals Exam
which of the following includes which user, device, or program has access to a particular resource, such as a printer, folder, or file on a corporate network or computer ?
Access Control List.(ACL)
which of the following locks could be used to identify a person by her fingerprint, handprint, face, retina , iris, voice, or handwritten signature?
Biometric Lock
Which of the following encryption (ONLY AVAILABLE) in windows professional and business editions locks down a hard drive by encrypting the entire windows volume on the drive and restricts access by requiring one or two encryption keys ?
BitLocker Encryption
which of the following tries every single combination of characters until it discovers your password?
Brute Force Attack
which of the following passwords could be used as a strong Password?
C0d12367$
which of the following locks could be used to secure a laptop or other computer to a table so someone can't walk away with it?
Cable Lock
which of the following Tabs allows you to configure proxy server settings and create a VPN (Virtual Private Network?)
Connection Tab
You have completed the windows troubleshoot process: what is the ABSOBLUTE LAST step in the process that should be performed?
Document What Happened
which of the following Social Engineering attacks have occurred when a person is looking for useful information in someone's trash to help create a convincing impersonation of an individual or company to aid in a malicious attack?
Dumpster Diving
There are 9 steps to windows Trouble shooting startup process. please identify what happenes when 2 or F2 is press?
Enable Boot Logging
There are 9 steps to windows Trouble shooting startup process. please identify what happenes when 1 or F1 Press
Enable Debugging
There are 9 steps to windows Trouble shooting startup process. please identify what happenes when 3 or F3 is press?
Enable Low-Resolution Video (640? 480)
There are 9 steps to windows Trouble shooting startup process. please identify what happenes when 4 or F4 is press?
Enable Safe-Mode
There are 9 steps to windows Trouble shooting startup process. please identify what happenes when 5 or F5 is press?
Enable Safe-Mode with Networking
Which of the following Windows Files System allows the user to Encrypted file and folders?
Encrypting File System (EFS)
In order to successfully pass the A+ 1002 (Core 2 Exam ) the candidate must score a 750 or better.
False
Many software companies, including Microsoft have implemented measures to control the use of their software which is called GDPR (general data protection Regulation)
False
The macOS is built on a LINUX Platform d
False
There are eight (8) step to the step-by step attack plan to clean u[ an infected system
False
True or False A Soft boot or warm boot involves turning on the power with the on/off switch.
False
True or False A. hard boot or cold boot involves using operating system to reboot
False
True or False AD Certification services (AD CS) secure. AD Certification services (AD CS) secures trust relationships with outside organizations.
False
True or False AD Federation services (AD FS) secure. AD Federation services (AD FS) secures identities of services, computer and users.
False
which of the following performs a clean installation of the most recent version of windows 10 and is often used to remove manufacturer bloatware?
Fresh Start
which of the following Tabs allows you to change the home page or add a second home page tab? you can protect your identity and when surfing records.
General Tab
which of the following works in Active Directory on a window domain, to control the privileges of computers and user on that domain?
Group Policy
which of the following groups has limited privileges on the system and is given a temporary profile that is deleted when the user signs out?
Guest User Group
Which of the following contains a subset of policies in Group policy this subset applies only to the local computer or local user?
Local Group Policy
which of the following allows you to specify how many MAC addresses a port can accept or to provide a whitelist of MAC addresses the switch will accept?
MAC Address Filtering
which of the following Social Engineering attacks have occurred when the sender of an email hoax scams you into responding with personal data about yourself?
Phishing
which of the following locks could be used to restrict physical access to the exposed ports?
Port Lock
which of the following could be used to control which devices can use any port or a specific port on the switch?
Port Security
which of the following groups can (ONLY) be found in older editions of windows and can read from and write to parts of the system other than its own user profile folders, install application, and perform limited administrative tasks?
Power User Group
You as the support technician, will be responsible to make sure the user account assigned to the employee has these privileges and no more. What is this approach called?
Principle of Least Privilege
which of the following malicious attacks holds your computer system hostage until you pay money?
Ransomware
which of the following partitions are on the hard drive that contains a copy of the Os build, diagnostics programs, and reinstalled applications needed to restore the system to its factory state?
Recovery Partition
which of the following malicious attacks loads itself before the OS boot is complete. It can hide in boot managers, boot loader programs or kernel mode device drivers?
Rootkit
which of the following Social Engineering attacks have occurred when other people secretly peek at your monitor screen as you work?
Shoulder Surfing
which of the following malicious attacks collect personal information that it transmits over the internet to web-hosting sites?
Spyware
which of the following password combinations protection strategies should be used to not make it easy to guess the password either by people or by computer programs using various programming methods?
Strong Password
which of the following Social Engineering attacks have occurred when an unauthorized person follows an employee through a secured entrance to a room or building?
Tailgating
which of the following malicious attacks does not need a host program to work, rather, it substitutes itself for a legitimate program?
Trojan
In order to successfully pass the A+1002 (Core 2 exam ) the candidate must score a 700 or better
True
Many software companies, including Microsoft have implemented measures to control the use of their software, which is called digital rights management (DRM)
True
The MacOs is build on a UNIX Platform
True
True or False A hard boot, or cold boot involves A hard boot, or cold boot involves turning on the power with the on/off switch
True
True or False A soft boot or warm boot, involves using the operating system to reboot
True
True or False AD Certificate services (AD CS) AD Certification services (AD CS) secures identities of services, computers and users.
True
True or False AD Federation services (AD FS) secure.. AD Federation services (AD FS) secure trust relationships with outside organizations
True
true or false There are seven (7) steps to the step There are seven (7) steps to the step-by- step attack plan to clean up an infected system
True
which of the following commands could be used to modify the boot configuration data file in windows?
bcdedit
If startup repair does not fix the problem, which of the following commands could be used to repair the Boot Configuration Data tile and boot sectors ?
bootrec
which fo the following commands allows take user to copy a file?
cp.
which of the following commands allows the user to troubleshoot problems with tcp/ip network connections?
ifconfig
which of the following allows the user to move a file or rename it, if the source and destination are the same directory ?
mv.
which of the following commands shows the name of the current of present working directory?
pwd.
which of the following commands allows the user to remove or delete the file or files that are specified?
rm.
which of the following commands allows the user to automatically shut down the system?
shutdown.
which of the following commands (when logged in as a normal user) grants right to use root command; otherwise know as superuser?
sudo.
which of the following malicious attacks copies itself throughout a network or the internet without a host program?
worm