Tech Week 4

Ace your homework & exams now with Quizwiz!

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information? a. phishing b. worm c. adware d. stealth virus

a. phishing

A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future? a. Check the computer for the latest OS patches and updates. b. Verify the physical security of all offices. c. Ensure the security policy is being enforced. d. Scan the computer with protection software.

c. Ensure the security policy is being enforced.

What is the most effective way of securing wireless traffic? a. WEP b. wireless MAC filtering c. SSID hiding d. WPA2

d. WPA2

A user notices that a PC is running slowly and exhibits a delayed response to keyboard commands. What is a probable cause of this symptom? a. A process is using most of the CPU resources. b. A recently installed device driver is incompatible with the boot controller. c. The video card does not support the resolution that is being used. d. One or more program files have been deleted.

a. A process is using most of the CPU resources.

Which Windows 7 feature allows a user to view the contents of the desktop by moving the mouse to the right edge of the taskbar? a. Aero Peek b. Snap c. thumbnail previews d. jump lists e. Search f. Shake

a. Aero Peek

What are two typical physical security precautions that a business can take to protect its computers and systems? (Choose two.) a. Disable the autorun feature in the operating system. b. Ensure that all operating system and antivirus software is up to date. c. Replace any software firewalls with a hardware firewall. d. Implement biometric authentication. e. Perform daily data backups.

a. Disable the autorun feature in the operating system. d. Implement biometric authentication.

All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to prevent this from happening? a. Enable UAC on the computer. b. Set the user folder permissions to Deny. c. Change the user file permissions to Read Only. d. Disable the users' accounts.

a. Enable UAC on the computer.

A Windows XP system is unable to boot properly. What is the procedure to use to boot this system into Safe Mode? a. Reboot the system, press and hold F8 until a menu is displayed, and then choose Safe Mode. b. Run the MSCONFIG utility and choose the option Selective Startup. c. Reboot the system and press Del or F2 depending on the system. d. From the command prompt run the shutdown -r -s command.

a. Reboot the system, press and hold F8 until a menu is displayed, and then choose Safe Mode.

Which three questions should be addressed by organizations developing a security policy? (Choose three.) a. What are the possible threats to the assets of the organization? b. How should future expansion be done? c. What assets require protection? d. What is to be done in the case of a security breach? e. What insurance coverage is required? f. When do the assets need protecting?

a. What are the possible threats to the assets of the organization c. What assets require protection? d. What is to be done in the case of a security breach?

Which question is an open ended question that could be used when helping a customer troubleshoot a Windows problem? a. What programs have you installed recently? b. Do you get a login prompt when the computer boots? c. Have you changed your password recently? d. Can you boot the operating system?

a. What programs have you installed recently?

Which two security precautions will help protect a workplace against social engineering? (Choose two.) a. registering and escorting all visitors to the premises b. performing daily data backups c. encrypting all sensitive data stored on the servers d. ensuring that each use of an access card allows access to only one user at the time e. ensuring that all operating system and antivirus software is up to date

a. registering and escorting all visitors to the premises d. ensuring that each use of an access card allows access to only one user at the time

What is the name given to the programming-code patterns of viruses? a. signatures b. mirrors c. virus definition tables d. grayware

a. signatures

This Windows 7 tool can encrypt the entire hard drive volume. a. Windows Firewall b. BitLocker c. Trusted Platform Module (TPM) d. Active X

b. BitLocker

A Windows computer locks with a stop error during startup then automatically reboots. The rebooting is making it difficult to see any error messages. What can be done so that the error messages can be viewed? a. View the error messages and recover the system using the System Image Recovery tool. b. In Safe Mode use the Advanced Startup Options menu to disable the auto restart function. c. Use the Event Log and other diagnostic utilities to research the stop error messages. d. Use the Last Known Good Configuration option to restart the operating system.

b. In Safe Mode use the Advanced Startup Options menu to disable the auto restart function.

When a user makes changes to the settings of a Windows system, where are these changes stored? a. Control Panel b. Registry c. boot.ini d. win.ini

b. Registry

You want to dispose of a 2.5 terabyte hard disc drive that contains confidential financial information. What is the recommended procedure to achieve this? a. Use data wiping. b. Smash the platters with a hammer. c. Immerse the HDD in a weak solution of bicarbonate of soda. d. Drill through the HDD.

b. Smash the platters with a hammer.

A technician is troubleshooting a PC. The display shows an "Invalid Boot Disk" error after the POST. What is a probable cause? a. The date and time have been changed in the BIOS and do not reflect the correct time and date. b. The MBR is corrupted. c. A process is using most of the CPU resources. d. The PC has a BIOS password. e. The PC does not have a floppy drive or the floppy drive is broken.

b. The MBR is corrupted.

What would be the result of having a corrupt Master Boot Record? a. The keyboard will be unresponsive to the user. b. The operating system will fail to start. c. A new application will fail to install. d. The printer will function incorrectly.

b. The operating system will fail to start.

Which partition is used by the Windows operating system to boot the computer? a. extended b. active c. RAID d. logical

b. active

What are two functions of an operating system? (Choose two.) a. web browsing b. managing applications c. controlling hardware access d. text processing e. program compilation f. flow chart editing g. controlling the BIOS

b. managing applications c. controlling hardware access

What is the term for the ability of a computer to run multiple applications at the same time? a. multiprocessing b. multitasking c. multimedia d. multiuser

b. multitasking

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.) a. physical addresses b. portsThis c. packet size d. protocols e. packet speed

b. portsThis d. protocols

An application update causes the computer to function improperly. Which Windows function could be used to roll the operating system back to a previous state? a. driver roll back b. restore point c. automatic update d. scanreg e. ntbackup

b. restore point

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent? a. DDoS b. social engineering c. anonymous keylogging d. spam

b. social engineering

Some home networking equipment (such as a wireless router) come programmed with a default username. What is a best practice if you were to purchase this type of equipment? a. Change the password but do not change the default username. b. Change the default username to "guest." c. Change both the default username and password. d. Never change the user and password in case you want to sell it on eBay.

c. Change both the default username and password.

Which action would help a technician to determine if a denial of service attack is being caused by malware on a host? a. Install rogue antivirus software on the host. b. Log on to the host as a different user. c. Disconnect the host from the network. d. Disable ActiveX and Silverlight on the host.

c. Disconnect the host from the network.

Which Windows administrative tool displays the usage of a number of computer resources simultaneously and can help a technician decide if an upgrade is needed? a. Component Services b. Services c. Performance Monitor d. Event Viewer

c. Performance Monitor

What are two features of the active partition of a hard drive? (Choose two.) a. An active partition must be assigned C: as the drive letter. b. Up to four primary partitions can be marked as active. c. The operating system uses the active partition to boot the system. d. The active partition may include the manufacturer recovery partition. e. The active partition must be a primary partition.

c. The operating system uses the active partition to boot the system. e. The active partition must be a primary partition.

A college uses virtualization technology to deploy information security courses. Some of the lab exercises involve studying the characteristics of computer viruses and worms. What is an advantage of conducting the lab exercises inside the virtualized environment as opposed to using actual PCs? a. The viruses and worms will have limited functionality inside the virtualized environment. b. The lab exercises are performed faster inside of the virtualized environment. c. Virus and worm attacks are more easily controlled in a virtualized environment, thus helping to protect the college network and its devices from attack. d. The virtualization environment has better tools to develop mitigation solutions.

c. Virus and worm attacks are more easily controlled in a virtualized environment, thus helping to protect the college network and its devices from attack.

What would be a reason for a computer user to use the Task Manager Performance tab? a. to view the services that are currently running on the PC b. to view the processes that are running and end a process if needed c. to check the CPU usage of the PC d. to increase the performance of the CPU

c. to check the CPU usage of the PC

Which two Windows utilities can be used to help maintain hard disks on computers that have had long periods of normal use? (Choose two.) a. Disk Format b. Disk Maintenance c. Disk Partition d. Disk Cleanup e. Disk Defragmenter

d. Disk Cleanup e. Disk Defragmenter

What are two advantages of the NTFS file system compared with FAT32? (Choose two.) a. NTFS allows faster access to external peripherals such as a USB drive. b. NTFS is easier to configure. c. NTFS allows the automatic detection of bad sectors. d. NTFS supports larger files. e. NTFS allows faster formatting of drives. f. NTFS provides more security features.

d. NTFS supports larger files. f. NTFS provides more security features.

A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly after the upgrade. What can the user do to fix this problem? a. Use the System Restore utility. b. Update the driver for the graphics card. c. Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control. d. Run the programs in Compatibility Mode.

d. Run the programs in Compatibility Mode.

A technician has loaded an incorrect video driver on a Windows 7 computer. How can the technician revert to a previous driver? a. Use regedit to remove the information about the graphics driver from the registry. b. Use the Devices and Printers control panel to right-click on the monitor, and select Properties.Select Roll Back Driver. c. Select Create a Restore Point from System Tools. d. Select the video adapter card Properties in Device Manager, select the Driver tab, and click Roll Back Driver.

d. Select the video adapter card Properties in Device Manager, select the Driver tab, and click Roll Back Driver.

Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue? a. Have you scanned your computer recently for viruses? b. Is your security software up to date? c. Did you open any attachments from a suspicious email message? d. What symptoms are you experiencing?

d. What symptoms are you experiencing?

Which term best describes the process of breaking a program into smaller parts that can be loaded as needed by the operating system? a. multiprocessing b. multitasking c. multiuser d. multithreading

d. multithreading

How much RAM can theoretically be addressed by a 64-bit operating system? a. 32 GB maximum b. 16 GB maximum c. 4 GB maximum d. 64 GB maximum e. 128 GB or more

e. 128 GB or more

A technician is attempting to create multiple partitions on a hard disk. What is the maximum number of primary partitions allowed per hard drive? a. 16 b. 32 c. 2 d. 1 e. 4

e. 4


Related study sets

Basic pharmacology for nurses ch. 18

View Set

Personality Disorder Adaptive Quizzing

View Set

Pearson Revel // Chapter 4: Social Interaction (PART 2: BUILDING BLOCKS OF SOCIETIES)

View Set

Life Insurance Exam #2 Chs. 9, 11-19, 22

View Set

Psychiatric-Mental Health Practice questions

View Set