Week 5: Chapter 10 Reviewing the Basics Quiz
Which of the following is the best example of a strong password? $y@mM2rr abcdefg p@ssw0rd Qwerty
$y@mM2rr
What does the Federal Copyright Act of 1976 specify? if you download the software, there are no restrictions on copying it software vendors cannot prohibit you from making copies of software you purchased one backup copy of software is allowed to be made copying paper documents is not allowed, but there are no restrictions on digital media
One backup copy of software is allowed to be made
Which window available from the Control Panel is used to require a Windows password to wake up a sleeping computer? Administrative Tools Device Manager Display Power Options
Power Options
Which of the following is an example of a security token transmits authentication to the system when the token gets in range of a query device? RFID badge key fob memory stripe card smart card
RFID badge
What tool is best to use when destroying data on a SSD drive? zero-fill utility electromagnetic utility degausser Secure Erase utility
Secure Erase utility
What hardware component is needed to set up BitLocker Encryption so that you can authenticate the computer? Multifactor authentication Hardware Firewall TPM chip Encrypted File System
TPM chip
Which anti-malware software is embedded in Windows 8? Panda Internet Security Windows Defender Microsoft Security Essentials McAfee Total Protection
Windows Defender
Why might a blank password be a better option than an easy-to-guess password? a security event is logged when a user logs on using a blank password attackers usually do not think to try a blank password accounts with blank passwords have limited privileges because you cannot authenticate remotely using a blank password
because you cannot authenticate remotely using a blank password
For which type of problem might you visit www.snopes.com? zero-day attack keylogger tailgating email hoax
email hoax
Which of the following makes the data on a mobile device essentially useless to a thief? full device encryption multifactor authentication iOS screen lock restrict failed login attempts
full device encryption
What command can you use to refresh local group policies without having to reboot the computer? gpresult gprefresh gpupdate gpedit
gpupdate
What does anti-malware software use to define or detect new malware? rescue disk malware certificates malware encyclopedias malware signatures
malware signatures
What command can be used to launch the User Accounts or Network Places Wizard, which can be used to manage users and their passwords? gpedit usraccwiz netplwiz gpupdate
netplwiz
Which BYOD policy might include the ability to perform a remote wipe on a device that is lost or stolen or when an employee is abruptly dismissed? jailbreaking locating off-boarding on-boarding
off-boarding
Which of the following is an example of social engineering? spyware virus Trojan phishing
phishing
What should a user do before they walk away from their computer in order to keep it secure? press Win+L press Ctrl+Alt+Del click on Start, then click Secure Workstation turn off the monitor
press Win+L
What should you do immediately if you find an infected computer that is connected to the network? run antivirus software reboot the computer quarantine the computer disconnect the hard drive
quarantine the computer
Which logon method is considered the most secure method? requiring users to press the Win+L booting to advanced startup requiring users to press Ctrl+Alt+Del using the welcome screen
requiring users to press Ctrl+Alt+Del
What type of malware loads itself before the OS boot is complete? worm Trojan phishing rootkit
rootkit
Which of the following best describes a computer that has been hacked and the hacker is using the computer to run repetitive software in the background without the knowledge of its user? man-in-the-middle zero-day attack zombie spyware
zombie