computer MCQ please help thanks SECURITY Choose the best answer. 1. Which of the
ID: 3769786 • Letter: C
Question
computer MCQ please help thanks
SECURITY
Choose the best answer.
1. Which of the following can be used to run a disk integrity check on a Windows XP system? A) ipconfig B) dxdiag C) chkdsk D) msconfig
Which technology uses a physical characteristic to establish identity? A) smart card B) key fob C) biometrics D) shoulder surfing
Locking a computer system when not in use is an example of _____. A) a privacy filter B) social engineering C) user education D) physical security
Which of the following will allow you to require complex passwords for users on a Windows XP computer? A) Local Policies B) Personalization C) Account Policies D) Windows Defender
Which of the following is a tool used in Windows Vista to encrypt an entire volume? A) Syslock B) BitLocker C) Drive Defender D) Netstat
To enable or disable Windows features for multiple users at once, you should use the _____. A) Batch registry interface B) Group policy editor C) User permissions domain D) None of the above
Which of the following is self-replicating code that runs on a computer, usually with harmful effects? A) virus B) trojan horse C) grayware D) adware
Which of the following tasks can be performed using MSConfig on a Windows 7 system? A) Ensure that the latest service packs and security patches have been applied B) Identify which applications are configured as startup programs C) Verify that all drivers are digitally signed D) Ensure that networking protocols are configured properly
Which of the following can you use to schedule a Disk Cleanup to run every week on a Windows Vista system? A) msconfig B) Task Manager C) Task Scheduler D) chkdsk
Someone calls from the help desk informing you that they got an urgent call from the company president last night requesting his username and password. What type of attack is this? A) spam B) phishing C) trojan horse D) social engineering
What kind of security threat is posed when a person lies about their identity to gain information necessary to access a computer system? A) social engineering B) worm C) malware D) shoulder surfing
Which of the following is not a factor in multifactor authentication? A) what you know B) who you know C) what you have D) who you are
Which of the following should be performed on a regular basis as part of planned maintenance on a mission-critical system? A) Perform a system restore monthly B) Back up data files daily C) Clear the browser cache daily D) Defragment the hard drive hourly
You are installing a new Wi-Fi router in a small office. You need to make sure that an attacker cannot change the security settings of the router. What should you do? A) disable DHCP and use a static IP addressing scheme B) configure WEP C) configure WPA2 D) change the admin username and password from the default values
Which of the following is a benefit to disabling SSID broadcasting on a wireless network? A) faster setup B) increased security C) faster downloads D) full IPv6 implementation
When should you apply security patches? A) During the next scheduled maintenance review B) As soon as possible after the patch is released C) After a user encounters a problem corrected by the patch D) When Windows prompts you to do so
Which of the following is not recommended when trying to make wireless connections more secure on a SOHO wireless router? A) changing the default SSID B) disabling SSID broadcast C) disabling 802.11D) changing the default username and password
Which of the following is an authentication process that requires more than one method? A) kerberos B) biometrics C) multifactor D) username and password
Only granting a user rights they need to perform their job is known as _____. A) the appropriate access principle B) the principle of data access compliance C) the principle of least privilege D) the bottom up principle
You have an 802.11g network in your office, and you want to make sure that people outside the company cannot see your wireless LAN in their list of available wireless networks. What should you do? A) implement MAC filtering B) configure a VPN C) implement IPv6 D) disable SSID broadcasting
Which of the following represents a social engineering attack? A) Botnet B) Password disclosure C) Trojan horse D) Spyware
Which of the following is true? A) Recovering data from a wiped hard drive requires expensive equipment. B) Deleting data is more reliable than overwriting it. C) Overwriting data on a hard drive requires expensive equipment. D) Physical destruction of a hard drive is never recommended.
Which of the following is the best definition for App? A) An FCC approved use of a mobile device. B) Anything written in Java or Javascript. C) Any program designed to run in an HTML5 environment. D) Usually a small program designed to run on a mobile platform.
The screen technology used by most modern mobile devices is known as a _____. A) Polarity touchscreen B) Multiadaptive touchscreen C) Capacitive touchscreen D) Anaerobic touchscreen
Which technology allows a mobile device to sense movement? A) Capacitive touchscreen B) Accelerometer C) Processor D) Embedded camera
Which of the following will help prevent data theft on a mobile device? A) Remote Wipe B) Screen protector C) Device locator application D) Remote backup
Which of the following is not considered a mobile device? A) Smartphone B) iPad C) Laptop computer D) Tablet
The process of adjusting the screen area or sensitivity of a touch device is known as _____. A) Initialization B) Utilization C) Capacitization D) Calibration
Which of the following is designed to be scanned by a mobile device? A) QR code B) OS code C) QA code D) IR code
Which technology allows a mobile device to detect its position in 3D space? A) Embedded camera B) Gyroscope C) Resistor D) Multimeter
Which of the following is not commonly considered a gesture on a touchscreen device? A) Tap B) Swirl C) Swipe D) Pinch
Explanation / Answer
1. Which of the following can be used to run a disk integrity check on a Windows XP system? A) ipconfig B) dxdiag C) chkdsk D) msconfig
Which technology uses a physical characteristic to establish identity? A) smart card B) key fob C) biometrics D) shoulder surfing
Locking a computer system when not in use is an example of _____. A) a privacy filter B) social engineering C) user education D) physical security
Which of the following will allow you to require complex passwords for users on a Windows XP computer? A) Local Policies B) Personalization C) Account Policies D) Windows Defender
Which of the following is a tool used in Windows Vista to encrypt an entire volume? A) Syslock B) BitLocker C) Drive Defender D) Netstat
To enable or disable Windows features for multiple users at once, you should use the _____. A) Batch registry interface B) Group policy editor C) User permissions domain D) None of the above
Which of the following is self-replicating code that runs on a computer, usually with harmful effects? A) virus B) trojan horse C) grayware D) adware
Which of the following tasks can be performed using MSConfig on a Windows 7 system? A) Ensure that the latest service packs and security patches have been applied B) Identify which applications are configured as startup programs C) Verify that all drivers are digitally signed D) Ensure that networking protocols are configured properly
Which of the following can you use to schedule a Disk Cleanup to run every week on a Windows Vista system? A) msconfig B) Task Manager C) Task Scheduler D) chkdsk
Someone calls from the help desk informing you that they got an urgent call from the company president last night requesting his username and password. What type of attack is this? A) spam B) phishing C) trojan horse D) social engineering
What kind of security threat is posed when a person lies about their identity to gain information necessary to access a computer system? A) social engineering B) worm C) malware D) shoulder surfing
Which of the following is not a factor in multifactor authentication? A) what you know B) who you know C) what you have D) who you are
Which of the following should be performed on a regular basis as part of planned maintenance on a mission-critical system? A) Perform a system restore monthly B) Back up data files daily C) Clear the browser cache daily D) Defragment the hard drive hourly
You are installing a new Wi-Fi router in a small office. You need to make sure that an attacker cannot change the security settings of the router. What should you do? A) disable DHCP and use a static IP addressing scheme B) configure WEP C) configure WPA2 D) change the admin username and password from the default values
Which of the following is a benefit to disabling SSID broadcasting on a wireless network? A) faster setup B) increased security C) faster downloads D) full IPv6 implementation
When should you apply security patches? A) During the next scheduled maintenance review B) As soon as possible after the patch is released C) After a user encounters a problem corrected by the patch D) When Windows prompts you to do so
Which of the following is not recommended when trying to make wireless connections more secure on a SOHO wireless router? A) changing the default SSID B) disabling SSID broadcast C) disabling 802.11D) changing the default username and password
Which of the following is an authentication process that requires more than one method? A) kerberos B) biometrics C) multifactor D) username and password
Only granting a user rights they need to perform their job is known as _____. A) the appropriate access principle B) the principle of data access compliance C) the principle of least privilege D) the bottom up principle
You have an 802.11g network in your office, and you want to make sure that people outside the company cannot see your wireless LAN in their list of available wireless networks. What should you do? A) implement MAC filtering B) configure a VPN C) implement IPv6 D) disable SSID broadcasting
Which of the following represents a social engineering attack? A) Botnet B) Password disclosure C) Trojan horse D) Spyware
Which of the following is true? A) Recovering data from a wiped hard drive requires expensive equipment. B) Deleting data is more reliable than overwriting it. C) Overwriting data on a hard drive requires expensive equipment. D) Physical destruction of a hard drive is never recommended.
Which of the following is the best definition for App? A) An FCC approved use of a mobile device. B) Anything written in Java or Javascript. C) Any program designed to run in an HTML5 environment. D) Usually a small program designed to run on a mobile platform.
The screen technology used by most modern mobile devices is known as a _____. A) Polarity touchscreen B) Multiadaptive touchscreen C) Capacitive touchscreen D) Anaerobic touchscreen
Which technology allows a mobile device to sense movement? A) Capacitive touchscreen B) Accelerometer C) Processor D) Embedded camera
Which of the following will help prevent data theft on a mobile device? A) Remote Wipe B) Screen protector C) Device locator application D) Remote backup
Which of the following is not considered a mobile device? A) Smartphone B) iPad C) Laptop computer D) Tablet
The process of adjusting the screen area or sensitivity of a touch device is known as _____. A) Initialization B) Utilization C) Capacitization D) Calibration
Which of the following is designed to be scanned by a mobile device? A) QR code B) OS code C) QA code D) IR code
Which technology allows a mobile device to detect its position in 3D space? A) Embedded camera B) Gyroscope C) Resistor D) Multimeter
Which of the following is not commonly considered a gesture on a touchscreen device? A) Tap B) Swirl C) Swipe D) Pinch
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.