What software program is an example of password management software
On a peer-to-peer
network, authentication is the responsibility of the domain.
True or False
·
False
Requiring users to
press Ctrl+Alt+Delete to get a logon window is more secure than the welcome
screen.
True or False
·
True
After initially
installing Windows 7, you need to disable the Guest account so nobody can use
it.
True or False
·
False
Using Group Policy,
you can set security policies to help secure a workstation.
True or False
·
True
A root certificate is
the original certificate issued by the CA.
True or False
·
True
What keystroke should
you press to get a logon window if you don't use the welcome screen?
Alt+F1
Ctrl+Ins+Home
Alt+F5+End
Ctrl+Alt+Delete
·
Ctrl+Alt+Delete
What statement is true
regarding the Guest account in Windows 7?
-it is disabled by default
-it automatically has a complex password
-you cannot rename it
-it has administrative access
·
it is disabled by
default
What statement
regarding passwords on Windows is accurate?
-it's best to write your password down so you don't get locked out of your
computer
-passwords cannot be longer than 14 characters
-by default, accounts with a blank password cannot logon remotely
-letters and numbers are allowed, but no symbols such as '@' or '!'
·
by default, accounts
with a blank password cannot logon remotely
When using the Windows
Encrypted File System, what statement is accurate?
-files can be marked for encryption, but not folders
-an encrypted file moved to an unencrypted folder remains encrypted
-EFS only works on NTFS and FAT32
-you need to download special software to use EFS
·
an encrypted file
moved to an unencrypted folder remains encrypted
If you want your
computer to be protected by BitLocker Encryption using computer authentication,
what feature must your computer have?
-a USB port
-an authentication key on the hard drive
-a TPM chip on the motherboard
-a PIN on the BIOS
·
a TPM chip on the
motherboard
If you don't want to
use BitLocker to protect your computer, you can still configure a power-on
password using which of the following?
-Windows POP technology
-the BIOS
-a feature available on some DVD drive
-your USB keyboard
·
the BIOS
One way to
authenticate users on a computer is to use a small device that contains
authentication information. What is this device called?
retinal scanner
LoJack token
smart card
TPM
·
smart card
What device provides a
strong magnetic field used to completely erase data on a hard drive or tape
drive?
ATA Secure Erase
low-level format
degausser
magnetic data filter
·
degausser
You should beware of a
person attempting to use your computer after you step away from it, a term
referred to as which of the following?
shoulder surfing
tailgating
social engineering
session hijacking
·
·
tailgating
What type of malware
can hijack internal Windows components and often goes undetected because it is
already loaded when the antivirus software loads?
Trojan horse
rootkit
adware
worm
·
rootkit
When an attacker
presents a program or himself as someone else to obtain private information and
pretends to be a legitimate website, network, FTP site, or person in a chat
session, what type of attack is occurring?
rootkit
zombie
brute-force
man-in-the-middle
·
man-in-the-middle
What technology can be
used to locate a device such as a laptop after it has been stolen?
Management software
LoJack
Trojan
Multifactor Trace software
·
LoJack
Anti-malware software
relies on what sort of update in order to define or detect malware as it gets
into the wild?
rootkits
malware signatures
static updates
Windows updates
·
malware signatures
What does the presence
of the Cydia app on an iOS device indicate?
a rootkit has been installed on the device
the device is infected with a worm
the device has been jailbroken
there is spyware software installed on the device
·
the device has been
jailbroken
What command can be
used to take full access of a file?
takeown
attrib
perms
icacls
·
icacls
What is intended to
legally protect the intellectual property rights of organizations or
individuals to creative works, which include books, images, and software?
copyright
license
user agreement
cease and desist order
·
copyright
CryptoLocker is an
example of what type of malware?
zero-day attack
worm
ransomware
man-in-the-middle
·
ransomware
A person that secretly
peaks at your monitor screen while you work may be doing what?
tailgating
screen capping
shoulder surfing
social engineering
·
shoulder surfing
Documentation for
evidence which includes exactly what, when, and from whom evidence was
collected, the condition of this evidence, and how the evidence was secured
while it was in your possession, is know by what term?
evidence security roster
chain of custody
item inventory
evidence tracking list
·
chain of custody
What methods exist to
lock down a workstation running Windows, such as when stepping away from the
screen? (Choose all that apply.)
-press Ctrl+End and click Logon Screen
-press Windows key + L
-press Ctrl+Alt+Delete and click Lock this Computer
-press F1 and click Sleep
·
press Windows key + L
press Ctrl+Alt+Delete and click Lock this Computer
What are some of the
ways you can use BitLocker Encryption? (Choose all that apply.)
-computer authentication using TPM
-user authentication using a certificate
-user authentication using a USB flash drive
-computer and user authentication using a PIN and TPM
·
computer
authentication using TPM
user authentication using a USB flash drive
computer and user authentication using a PIN and TPM
What inputs would be
considered to be part of a biometric device? (Choose all that apply.)
keystrokes
retina
fingerprint
voice
·
retina
fingerprint
voice
What software program
is an example of password management software? (Choose all that apply.)
KeePass
LastPass
Dashlane
PassLock
·
KeePass
LastPass
Dashlane
When creating a strong
password, what are some valid criteria the password should meet? (Choose all
that apply.)
-the password should be at least eight characters long
-you should not use adjacent keys on the keyboard, such as asdf
-you should combine uppercase and lower case letters, numbers, and symbols
-you can use words from a foreign language to make the password more secure
·
the password should be
at least eight characters long
you should not use adjacent keys on the keyboard, such as asdf
you should combine uppercase and lower case letters, numbers, and symbols