CompTIA A_ Certification All-In-One Exam Guide, Seventh Edition - Michael Meyers [472]
A. Cracking
B. Hacking
C. Network engineering
D. Social engineering
2. Which of the following might offer good hardware authentication?
A. Strong passwords
B. Encrypted passwords
C. NTFS
D. Smart cards
3. Which of the following tools would enable you to stop a user from logging on to a local machine, but still enable him to log on to the domain?
A. AD Policy
B. Group Policy
C. Local Security Settings
D. User Settings
4. Which type of encryption offers the most security?
A. MS-CHAP
B. PAP
C. POP3
D. SMTP
5. Zander downloaded a game off the Internet and installed it, but as soon as he started to play, he got a Blue Screen of Death. Upon rebooting, he discovered that his My Documents folder had been erased. What happened?
A. He installed spyware.
B. He installed a Trojan.
C. He broke the Group Policy.
D. He broke the Local Security Settings.
6. Which of the following should Mary set up on her Wi-Fi router to make it the most secure?
A. NTFS
B. WEP
C. WPA
D. WPA2
7. What tool would you use to enable auditing on a local level?
A. AD Policy
B. Group Policy
C. Local Security Settings
D. User Settings
8. John dressed up in a fake security guard uniform that matched the uniforms of a company and then walked in with some legitimate employees in an attempt to gain access to company resources. What kind of attack is this?
A. Administrative access
B. Data destruction
C. Spoofing
D. Tailgating
9. The first day on the job, Jill received a spreadsheet that listed approved software for users and clear instructions not to allow any unapproved software. What kind of policy must she follow?
A. Classification
B. Compliance
C. Group
D. Security
10. Edna wants to put a policy in place at her company with regard to virus prevention or at least limitation. What policies would offer the best solution?
A. Install antivirus software on every computer. Teach users how to run it.
B. Install antivirus software on every computer. Set the software up to scan regularly.
C. Install antivirus software on every computer. Set the software up to update the definitions and engine automatically. Set the software up to scan regularly.
D. Install antivirus software on every computer. Set the software up to update the definitions and engine automatically. Set the software up to scan regularly. Educate the users about sites and downloads to avoid.
Answers
1. D. Social engineering is the process of using or manipulating people to gain access to network resources.
2. D. Smart cards are an example of hardware authentication devices.
3. C. You can use Local Security Settings to stop someone from logging on to a local machine.
4. A. Of the choices here, MS-CHAP offers the most security.
5. B. Zander clearly installed a Trojan, a virus masquerading as a game.
6. D. Mary should set up WPA2 on her Wi-Fi router.
7. C. You can enable local auditing through Local Security Settings.
8. D. John just practiced tailgating on the unsuspecting company.
9. B. Jill needs to enforce compliance to help keep the tech support calls at a minimum and the uptime for users at a maximum.
10. D. The best policy includes updating the software engine and definitions, scanning PCs regularly, and educating users.
CHAPTER 27
The Complete PC Tech
In this chapter, you will learn how to
Describe how computers work
Implement a troubleshooting methodology
Describe a technician’s toolkit
When a mission-critical computer goes down, regardless of the industry, people get upset. Workers can’t work, so they feel guilty. Employers can’t get product out on time, so they feel anxious. Supervisors blame employees for fouling things up, or at least the employees fear such blame, even if they did not break the machine.
Into this charged atmosphere comes the tech, ready to fix the computer and move on to the next challenge. Accomplishing