Week 5: Chapter 10 Reviewing the Basics Quiz

Ace your homework & exams now with Quizwiz!

Which of the following is the best example of a strong password? $y@mM2rr abcdefg p@ssw0rd Qwerty

$y@mM2rr

What does the Federal Copyright Act of 1976 specify? if you download the software, there are no restrictions on copying it software vendors cannot prohibit you from making copies of software you purchased one backup copy of software is allowed to be made copying paper documents is not allowed, but there are no restrictions on digital media

One backup copy of software is allowed to be made

Which window available from the Control Panel is used to require a Windows password to wake up a sleeping computer? Administrative Tools Device Manager Display Power Options

Power Options

Which of the following is an example of a security token transmits authentication to the system when the token gets in range of a query device? RFID badge key fob memory stripe card smart card

RFID badge

What tool is best to use when destroying data on a SSD drive? zero-fill utility electromagnetic utility degausser Secure Erase utility

Secure Erase utility

What hardware component is needed to set up BitLocker Encryption so that you can authenticate the computer? Multifactor authentication Hardware Firewall TPM chip Encrypted File System

TPM chip

Which anti-malware software is embedded in Windows 8? Panda Internet Security Windows Defender Microsoft Security Essentials McAfee Total Protection

Windows Defender

Why might a blank password be a better option than an easy-to-guess password? a security event is logged when a user logs on using a blank password attackers usually do not think to try a blank password accounts with blank passwords have limited privileges because you cannot authenticate remotely using a blank password

because you cannot authenticate remotely using a blank password

For which type of problem might you visit www.snopes.com? zero-day attack keylogger tailgating email hoax

email hoax

Which of the following makes the data on a mobile device essentially useless to a thief? full device encryption multifactor authentication iOS screen lock restrict failed login attempts

full device encryption

What command can you use to refresh local group policies without having to reboot the computer? gpresult gprefresh gpupdate gpedit

gpupdate

What does anti-malware software use to define or detect new malware? rescue disk malware certificates malware encyclopedias malware signatures

malware signatures

What command can be used to launch the User Accounts or Network Places Wizard, which can be used to manage users and their passwords? gpedit usraccwiz netplwiz gpupdate

netplwiz

Which BYOD policy might include the ability to perform a remote wipe on a device that is lost or stolen or when an employee is abruptly dismissed? jailbreaking locating off-boarding on-boarding

off-boarding

Which of the following is an example of social engineering? spyware virus Trojan phishing

phishing

What should a user do before they walk away from their computer in order to keep it secure? press Win+L press Ctrl+Alt+Del click on Start, then click Secure Workstation turn off the monitor

press Win+L

What should you do immediately if you find an infected computer that is connected to the network? run antivirus software reboot the computer quarantine the computer disconnect the hard drive

quarantine the computer

Which logon method is considered the most secure method? requiring users to press the Win+L booting to advanced startup requiring users to press Ctrl+Alt+Del using the welcome screen

requiring users to press Ctrl+Alt+Del

What type of malware loads itself before the OS boot is complete? worm Trojan phishing rootkit

rootkit

Which of the following best describes a computer that has been hacked and the hacker is using the computer to run repetitive software in the background without the knowledge of its user? man-in-the-middle zero-day attack zombie spyware

zombie


Related study sets

Bio 1101: Unit 3- Endocrine System Quiz

View Set

DE Biology Pearson Chapter 18 Dynamic Study Module

View Set

review questions for X-ray Equipment Operation

View Set

Chapter 23: Endocrine Disorders and Therapeutic Management

View Set

Physics P1: Radio Waves and Microwaves

View Set

IGCSE Biology - Comparison of plant and animal cells

View Set