Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

computer MCQ please help thanks SECURITY Choose the best answer. 1. Which of the

ID: 3769786 • Letter: C

Question

computer MCQ please help thanks

SECURITY
Choose the best answer.

1. Which of the following can be used to run a disk integrity check on a Windows XP system? A) ipconfig B) dxdiag C) chkdsk D) msconfig

Which technology uses a physical characteristic to establish identity? A) smart card B) key fob C) biometrics D) shoulder surfing

Locking a computer system when not in use is an example of _____. A) a privacy filter B) social engineering C) user education D) physical security

Which of the following will allow you to require complex passwords for users on a Windows XP computer? A) Local Policies B) Personalization C) Account Policies D) Windows Defender

Which of the following is a tool used in Windows Vista to encrypt an entire volume? A) Syslock B) BitLocker C) Drive Defender D) Netstat

To enable or disable Windows features for multiple users at once, you should use the _____. A) Batch registry interface B) Group policy editor C) User permissions domain D) None of the above

Which of the following is self-replicating code that runs on a computer, usually with harmful effects? A) virus B) trojan horse C) grayware D) adware

Which of the following tasks can be performed using MSConfig on a Windows 7 system? A) Ensure that the latest service packs and security patches have been applied B) Identify which applications are configured as startup programs C) Verify that all drivers are digitally signed D) Ensure that networking protocols are configured properly

Which of the following can you use to schedule a Disk Cleanup to run every week on a Windows Vista system? A) msconfig B) Task Manager C) Task Scheduler D) chkdsk

Someone calls from the help desk informing you that they got an urgent call from the company president last night requesting his username and password. What type of attack is this? A) spam B) phishing C) trojan horse D) social engineering

What kind of security threat is posed when a person lies about their identity to gain information necessary to access a computer system? A) social engineering B) worm C) malware D) shoulder surfing

Which of the following is not a factor in multifactor authentication? A) what you know B) who you know C) what you have D) who you are

Which of the following should be performed on a regular basis as part of planned maintenance on a mission-critical system? A) Perform a system restore monthly B) Back up data files daily C) Clear the browser cache daily D) Defragment the hard drive hourly

You are installing a new Wi-Fi router in a small office. You need to make sure that an attacker cannot change the security settings of the router. What should you do? A) disable DHCP and use a static IP addressing scheme B) configure WEP C) configure WPA2 D) change the admin username and password from the default values

Which of the following is a benefit to disabling SSID broadcasting on a wireless network? A) faster setup B) increased security C) faster downloads D) full IPv6 implementation

When should you apply security patches? A) During the next scheduled maintenance review B) As soon as possible after the patch is released C) After a user encounters a problem corrected by the patch D) When Windows prompts you to do so

Which of the following is not recommended when trying to make wireless connections more secure on a SOHO wireless router? A) changing the default SSID B) disabling SSID broadcast C) disabling 802.11D) changing the default username and password

Which of the following is an authentication process that requires more than one method? A) kerberos B) biometrics C) multifactor D) username and password

Only granting a user rights they need to perform their job is known as _____. A) the appropriate access principle B) the principle of data access compliance C) the principle of least privilege D) the bottom up principle

You have an 802.11g network in your office, and you want to make sure that people outside the company cannot see your wireless LAN in their list of available wireless networks. What should you do? A) implement MAC filtering B) configure a VPN C) implement IPv6 D) disable SSID broadcasting

Which of the following represents a social engineering attack? A) Botnet B) Password disclosure C) Trojan horse D) Spyware

Which of the following is true? A) Recovering data from a wiped hard drive requires expensive equipment. B) Deleting data is more reliable than overwriting it. C) Overwriting data on a hard drive requires expensive equipment. D) Physical destruction of a hard drive is never recommended.

Which of the following is the best definition for App? A) An FCC approved use of a mobile device. B) Anything written in Java or Javascript. C) Any program designed to run in an HTML5 environment. D) Usually a small program designed to run on a mobile platform.

The screen technology used by most modern mobile devices is known as a _____. A) Polarity touchscreen B) Multiadaptive touchscreen C) Capacitive touchscreen D) Anaerobic touchscreen

Which technology allows a mobile device to sense movement? A) Capacitive touchscreen B) Accelerometer C) Processor D) Embedded camera

Which of the following will help prevent data theft on a mobile device? A) Remote Wipe B) Screen protector C) Device locator application D) Remote backup

Which of the following is not considered a mobile device? A) Smartphone B) iPad C) Laptop computer D) Tablet

The process of adjusting the screen area or sensitivity of a touch device is known as _____. A) Initialization B) Utilization C) Capacitization D) Calibration

Which of the following is designed to be scanned by a mobile device? A) QR code B) OS code C) QA code D) IR code

Which technology allows a mobile device to detect its position in 3D space? A) Embedded camera B) Gyroscope C) Resistor D) Multimeter

Which of the following is not commonly considered a gesture on a touchscreen device? A) Tap B) Swirl C) Swipe D) Pinch

Explanation / Answer

1. Which of the following can be used to run a disk integrity check on a Windows XP system? A) ipconfig B) dxdiag C) chkdsk D) msconfig

Which technology uses a physical characteristic to establish identity? A) smart card B) key fob C) biometrics D) shoulder surfing

Locking a computer system when not in use is an example of _____. A) a privacy filter B) social engineering C) user education D) physical security

Which of the following will allow you to require complex passwords for users on a Windows XP computer? A) Local Policies B) Personalization C) Account Policies D) Windows Defender

Which of the following is a tool used in Windows Vista to encrypt an entire volume? A) Syslock B) BitLocker C) Drive Defender D) Netstat

To enable or disable Windows features for multiple users at once, you should use the _____. A) Batch registry interface B) Group policy editor C) User permissions domain D) None of the above

Which of the following is self-replicating code that runs on a computer, usually with harmful effects? A) virus B) trojan horse C) grayware D) adware

Which of the following tasks can be performed using MSConfig on a Windows 7 system? A) Ensure that the latest service packs and security patches have been applied B) Identify which applications are configured as startup programs C) Verify that all drivers are digitally signed D) Ensure that networking protocols are configured properly

Which of the following can you use to schedule a Disk Cleanup to run every week on a Windows Vista system? A) msconfig B) Task Manager C) Task Scheduler D) chkdsk

Someone calls from the help desk informing you that they got an urgent call from the company president last night requesting his username and password. What type of attack is this? A) spam B) phishing C) trojan horse D) social engineering

What kind of security threat is posed when a person lies about their identity to gain information necessary to access a computer system? A) social engineering B) worm C) malware D) shoulder surfing

Which of the following is not a factor in multifactor authentication? A) what you know B) who you know C) what you have D) who you are

Which of the following should be performed on a regular basis as part of planned maintenance on a mission-critical system? A) Perform a system restore monthly B) Back up data files daily C) Clear the browser cache daily D) Defragment the hard drive hourly

You are installing a new Wi-Fi router in a small office. You need to make sure that an attacker cannot change the security settings of the router. What should you do? A) disable DHCP and use a static IP addressing scheme B) configure WEP C) configure WPA2 D) change the admin username and password from the default values

Which of the following is a benefit to disabling SSID broadcasting on a wireless network? A) faster setup B) increased security C) faster downloads D) full IPv6 implementation

When should you apply security patches? A) During the next scheduled maintenance review B) As soon as possible after the patch is released C) After a user encounters a problem corrected by the patch D) When Windows prompts you to do so

Which of the following is not recommended when trying to make wireless connections more secure on a SOHO wireless router? A) changing the default SSID B) disabling SSID broadcast C) disabling 802.11D) changing the default username and password

Which of the following is an authentication process that requires more than one method? A) kerberos B) biometrics C) multifactor D) username and password

Only granting a user rights they need to perform their job is known as _____. A) the appropriate access principle B) the principle of data access compliance C) the principle of least privilege D) the bottom up principle

You have an 802.11g network in your office, and you want to make sure that people outside the company cannot see your wireless LAN in their list of available wireless networks. What should you do? A) implement MAC filtering B) configure a VPN C) implement IPv6 D) disable SSID broadcasting

Which of the following represents a social engineering attack? A) Botnet B) Password disclosure C) Trojan horse D) Spyware

Which of the following is true? A) Recovering data from a wiped hard drive requires expensive equipment. B) Deleting data is more reliable than overwriting it. C) Overwriting data on a hard drive requires expensive equipment. D) Physical destruction of a hard drive is never recommended.

Which of the following is the best definition for App? A) An FCC approved use of a mobile device. B) Anything written in Java or Javascript. C) Any program designed to run in an HTML5 environment. D) Usually a small program designed to run on a mobile platform.

The screen technology used by most modern mobile devices is known as a _____. A) Polarity touchscreen B) Multiadaptive touchscreen C) Capacitive touchscreen D) Anaerobic touchscreen

Which technology allows a mobile device to sense movement? A) Capacitive touchscreen B) Accelerometer C) Processor D) Embedded camera

Which of the following will help prevent data theft on a mobile device? A) Remote Wipe B) Screen protector C) Device locator application D) Remote backup

Which of the following is not considered a mobile device? A) Smartphone B) iPad C) Laptop computer D) Tablet

The process of adjusting the screen area or sensitivity of a touch device is known as _____. A) Initialization B) Utilization C) Capacitization D) Calibration

Which of the following is designed to be scanned by a mobile device? A) QR code B) OS code C) QA code D) IR code

Which technology allows a mobile device to detect its position in 3D space? A) Embedded camera B) Gyroscope C) Resistor D) Multimeter

Which of the following is not commonly considered a gesture on a touchscreen device? A) Tap B) Swirl C) Swipe D) Pinch