ITN 106 Final Exam # 3 - Modules 18 to 21

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Which one of the following Screen lock options is not secure?

Swipe

2
New cards

What is the reason for encrypting a mobile device's hard drive? [Choose all that apply]

Prevent unauthorized access to the data on the device

Prevent the device's hard drive from being accessed when lost or stolen

3
New cards

Which mobile security feature ensures that the device will not be vulnerable to attacks?

Security Update

4
New cards

Which file type can be used to create a script file on a Linux operating system?

*.sh

5
New cards

Which command is used to create a new file on a Linux operating system?

touch

6
New cards

Which command in Windows PowerShell can be used to map a network drive?

New-PSDrive

7
New cards

What is the purpose of creating a script file? [Choose all that apply]

Automate repetitive tasks

Decrease administrative effort

8
New cards

Which of the following can be the outcome of a malware attack? (Choose all the apply)

Application generating unexpected output

System slow down

Application crash

System lockups

9
New cards

Which of the following malware attributes can be viewed in the details window when a threat is detected?

The following malware attributes can be viewed:

Alert level

Status

Date

Category

Details

Affected items

10
New cards

Which of the following allows users to create point-in-time configuration snapshots that can be used to return a Windows machine to an early configuration?

System Restore

11
New cards

Which of the following version of the "ls" command displays directory and file permissions?

ls -l

12
New cards

What is the function of the 'cd..' command?

Navigates from the "/home/administrator" directory to "/home"

13
New cards

What is the function of the "chmod" command?

Allows you to configure permissions in Linux

14
New cards

Which of the following tasks can Linux commands perform?

Create a new user account

Terminate Processes

Restart

Shutdown

Copy directories

15
New cards

What does the acronym pwd stand for?

Print Working Directory

16
New cards

In File Finder, where would you find the Close, Minimize, and Maximize options?

Left-hand side

17
New cards

Which of the following tools can you use to search for things on your MAC computer?

Spotlight Search

18
New cards

Which of the following is the purpose of Mission Control?

It allows you to view all your open windows and applications and switch between them

19
New cards

Which of the following does Disk Utility allow you to manage?

Storage devices that are internal to the machine

20
New cards

Which of the following tools can you use to complete full drive encryption?

FileVault

21
New cards

Which of the following is a built-in Windows tool that allows a user to connect to a computer remotely as if they were sitting right in front of it, and only one connection can be made at a time?

Remote Desktop Protocol

22
New cards

In which of the following remote connection will a user request help from a technician with an invitation and a password to help secure the connection?

Remote Assistance

23
New cards

Which type of connection is initiated by the technician with a code that is given to the user to input? A series of permissions checks occur, and the user and technician will be connected.

Quick Assist

24
New cards

Which of the following is a secure connection with encryption and authentication that encapsulates packets and creates tunnels?

Virtual Private Network

25
New cards

Which of the following remote access technology allows administrators the ability to remotely administer computers via the command line?

SSH

26
New cards

Which of the following is a set of protocols and technologies that enable devices to discover and connect to one another automatically?

UPnP

27
New cards

Which Wi-Fi standard encrypts information packets as they are sent out from the access point or wireless network card using the RC4 stream cipher algorithm?

Wired Equivalent Privacy (WEP)

28
New cards

What's the port number for Hypertext Transfer Protocol Secure (HTTPS)?

443

29
New cards

Which of the following are easily researchable and should be immediately changed upon setting up a device?

Default Passwords

30
New cards

Which of the following are IP Filtering techniques? [Choose all that apply]

Route Filtering

Firewall Filtering

Email Filtering

31
New cards

Which of the following does SOHO stand for?

Small Office Home Office

32
New cards

When going over the wireless settings, why is it recommended to change the default SSID?

Anybody from outside your network will be able to figure out what devices you are using and what they could attack

33
New cards

Which of the following would you use to secure a signal? [Choose all that apply]

Authentication

Encryption

34
New cards

Which of the following would be the best way to ensure that devices on your network do not gain access to certain websites containing specified words?

Content Filtering

35
New cards

Which of the following are examples of Remote Access Technologies? [Choose all that apply]

RADIUS

TACACS

802.1 X

36
New cards

Which security control requires users, devices, and applications to be given only the minimum level of permissions that are necessary to complete the task?

Principle of Least Privilege

37
New cards

Which network devices rely on Access Control Lists (ACL) to permit network connections? [Choose all that apply]

Router

Switch

Firewall

38
New cards

Which of the following are Multifactor Authentication (MFA) factors? [Choose all that apply]

Possession-based

Behavioral

Knowledge-based

Location

Biometrics

(All but Profession)

39
New cards

Which of these is not an Email domain authentication method? [Choose all that apply]

S/MIME

TLS

40
New cards

Which type of security control includes policies, procedures, rules, standards, regulations, and frameworks?

Administrative control

41
New cards

Which of the following may cause an application to fail to launch on a mobile device?

Certain permissions have been disabled

42
New cards

Which of the following can you do if an application crashes? [Choose all that apply]

Clear the application data

Uninstall and reinstall the application

Clear the cache

43
New cards

Which of the following may help to prolong the battery life? [Choose all that apply]

Turning on battery-saving mode

Dimming the screen

Turning on airplane mode

44
New cards

For which of the following reasons is root user access usually locked on phones?

You don't usually need to do things on phones that require administrator access

45
New cards

Which of the following will help prevent viruses from being downloaded onto your mobile device?

Only download apps from a trusted installation source

Only download apps from a trusted installation source