Assignment 9-Chapter 9 Security Essentials
Question 1
1 out of 1
points
An RFID badge is related to which type of
authentication method? Page 442
Answer
Selected Answer:
c.
smart card
Question 2
1 out of 1
points
Which command can you perform at the Windows RE
command prompt to repair the OS boot record on Windows 7? Page 462
Answer
Selected Answer:
d.
bootrec /fixboot
Question 3
1 out of 1
points
You should beware of a person attempting to use
your computer after you step away from it, a term referred to as which of the
following? Page 446
Answer
Selected Answer:
d.
tailgating
Question 4
1 out of 1
points
A privacy filter is used for what aspect of
security? Page 444
Answer
Selected Answer:
c.
screen viewing
Question 5
1 out of 1
points
Using Group Policy, you can set security policies
to help secure a workstation. Page 436
Answer
Selected Answer:
True
Question 6
1 out of 1
points
On a peer-to-peer network, authentication is the
responsibility of the domain. Page 426
Answer
Selected Answer:
False
Question 7
1 out of 1
points
What keystroke should you press to get a logon
window if you don’t use the welcome screen? Page 427
Answer
Selected Answer:
b.
Ctrl+Alt+Delete
Question 8
1 out of 1
points
After initially installing Windows 7, you need to
disable the Guest account so nobody can use it. Page 430
Answer
Selected Answer:
False
Question 9
1 out of 1
points
Requiring users to press Ctrl+Alt+Delete to get a
logon window is more secure than the welcome screen. Page 427
Answer
Selected Answer:
True
Question 10
1 out of 1
points
Which of the following provides a strong magnetic
field used to completely erase data on a hard drive or tape drive? Page 445
Answer
Selected Answer:
d. degausser
Question 11
1 out of 1
points
Which of the following is true about the Guest
account in Windows 7? Page 430, 437
Answer
Selected Answer:
b.
it is disabled by default
Question 12
1 out of 1
points
It’s usually a good idea to run several
anti-malware programs at the same time on your computer. Page 463
Answer
Selected Answer:
False
Question 13
1 out of 1
points
If you don’t want to use BitLocker to protect
your computer, you can still configure a power-on password using which of the
following? Page 440
Answer
Selected Answer:
d.
the BIOS
Question 14
1 out of 1
points
If you want your computer to be protected by
BitLocker Encryption using computer authentication, what feature must your
computer have? Page 439
Answer
Selected Answer:
a.
a TPM chip on the motherboard
Question 15
1 out of 1
points
Which type of malware can hijack internal Windows
components and often goes undetected because it is already loaded when the
antivirus software loads? Page 448
Answer
Selected Answer:
b.
rootkit
Question 16
1 out of 1
points
If you need to understand the parent-child
relationships between running processes and view parent processes as they
call other processes, what tool should you use? Page 460
Answer
Selected Answer:
a.
Process Explorer
Question 17
1 out of 1
points
Which of the following is NOT true about using
Group Policy on business and professional editions of Windows? Page 437-438
Answer
Selected Answer:
b.
you can use gpedit.msc to see
if any policies conflict
Question 18
1 out of 1
points
Which of the following is true about the Windows
Encrypted File System? Page 432
Answer
Selected Answer:
a.
an encrypted file moved to an
unencrypted folder remains encrypted
Question 19
1 out of 1
points
Which of the following is true about passwords.
Page 431-432
Answer
Selected Answer:
c.
by default, accounts with a
blank password cannot logon remotely
Question 20
1 out of 1 points
Which type of malware hides in the MBR program of
a hard drive? Page 448
Answer
Selected Answer:
a.
boot sector virus
Question 21
1 out of 1
points
One way to authenticate users on a computer is to
use a small device that contains authentication information. What is
this device called? Page 441
Answer
Selected Answer:
b.
smart card
Leave a reply