1/44
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which one of the following Screen lock options is not secure?
Swipe
What is the reason for encrypting a mobile device's hard drive? [Choose all that apply]
Prevent unauthorized access to the data on the device
Prevent the device's hard drive from being accessed when lost or stolen
Which mobile security feature ensures that the device will not be vulnerable to attacks?
Security Update
Which file type can be used to create a script file on a Linux operating system?
*.sh
Which command is used to create a new file on a Linux operating system?
touch
Which command in Windows PowerShell can be used to map a network drive?
New-PSDrive
What is the purpose of creating a script file? [Choose all that apply]
Automate repetitive tasks
Decrease administrative effort
Which of the following can be the outcome of a malware attack? (Choose all the apply)
Application generating unexpected output
System slow down
Application crash
System lockups
Which of the following malware attributes can be viewed in the details window when a threat is detected?
The following malware attributes can be viewed:
Alert level
Status
Date
Category
Details
Affected items
Which of the following allows users to create point-in-time configuration snapshots that can be used to return a Windows machine to an early configuration?
System Restore
Which of the following version of the "ls" command displays directory and file permissions?
ls -l
What is the function of the 'cd..' command?
Navigates from the "/home/administrator" directory to "/home"
What is the function of the "chmod" command?
Allows you to configure permissions in Linux
Which of the following tasks can Linux commands perform?
Create a new user account
Terminate Processes
Restart
Shutdown
Copy directories
What does the acronym pwd stand for?
Print Working Directory
In File Finder, where would you find the Close, Minimize, and Maximize options?
Left-hand side
Which of the following tools can you use to search for things on your MAC computer?
Spotlight Search
Which of the following is the purpose of Mission Control?
It allows you to view all your open windows and applications and switch between them
Which of the following does Disk Utility allow you to manage?
Storage devices that are internal to the machine
Which of the following tools can you use to complete full drive encryption?
FileVault
Which of the following is a built-in Windows tool that allows a user to connect to a computer remotely as if they were sitting right in front of it, and only one connection can be made at a time?
Remote Desktop Protocol
In which of the following remote connection will a user request help from a technician with an invitation and a password to help secure the connection?
Remote Assistance
Which type of connection is initiated by the technician with a code that is given to the user to input? A series of permissions checks occur, and the user and technician will be connected.
Quick Assist
Which of the following is a secure connection with encryption and authentication that encapsulates packets and creates tunnels?
Virtual Private Network
Which of the following remote access technology allows administrators the ability to remotely administer computers via the command line?
SSH
Which of the following is a set of protocols and technologies that enable devices to discover and connect to one another automatically?
UPnP
Which Wi-Fi standard encrypts information packets as they are sent out from the access point or wireless network card using the RC4 stream cipher algorithm?
Wired Equivalent Privacy (WEP)
What's the port number for Hypertext Transfer Protocol Secure (HTTPS)?
443
Which of the following are easily researchable and should be immediately changed upon setting up a device?
Default Passwords
Which of the following are IP Filtering techniques? [Choose all that apply]
Route Filtering
Firewall Filtering
Email Filtering
Which of the following does SOHO stand for?
Small Office Home Office
When going over the wireless settings, why is it recommended to change the default SSID?
Anybody from outside your network will be able to figure out what devices you are using and what they could attack
Which of the following would you use to secure a signal? [Choose all that apply]
Authentication
Encryption
Which of the following would be the best way to ensure that devices on your network do not gain access to certain websites containing specified words?
Content Filtering
Which of the following are examples of Remote Access Technologies? [Choose all that apply]
RADIUS
TACACS
802.1 X
Which security control requires users, devices, and applications to be given only the minimum level of permissions that are necessary to complete the task?
Principle of Least Privilege
Which network devices rely on Access Control Lists (ACL) to permit network connections? [Choose all that apply]
Router
Switch
Firewall
Which of the following are Multifactor Authentication (MFA) factors? [Choose all that apply]
Possession-based
Behavioral
Knowledge-based
Location
Biometrics
(All but Profession)
Which of these is not an Email domain authentication method? [Choose all that apply]
S/MIME
TLS
Which type of security control includes policies, procedures, rules, standards, regulations, and frameworks?
Administrative control
Which of the following may cause an application to fail to launch on a mobile device?
Certain permissions have been disabled
Which of the following can you do if an application crashes? [Choose all that apply]
Clear the application data
Uninstall and reinstall the application
Clear the cache
Which of the following may help to prolong the battery life? [Choose all that apply]
Turning on battery-saving mode
Dimming the screen
Turning on airplane mode
For which of the following reasons is root user access usually locked on phones?
You don't usually need to do things on phones that require administrator access
Which of the following will help prevent viruses from being downloaded onto your mobile device?
Only download apps from a trusted installation source
Only download apps from a trusted installation source