Please select the correct corresponding answer. Answers can only be used ONCE! B
ID: 3774590 • Letter: P
Question
Please select the correct corresponding answer. Answers can only be used ONCE!
BYOD
LoJack
degausser
ACL
keylogger
rootkit
smart card
Wi-Fi Analyzer
zero-day attack
Software Piracy
Bring your own device
Access Control List
Software or hardware to read and record all keyboard entries
Device to erase platter hard drives
Hacker finds and exploits a vulnerability which there is no known defense or solution.
Theft, illegal copying, distribution or use of copyright software
Tracking/locationg software for stolen laptops
Software application which observes and collects data about Wi-Fi systems to try to troubleshoot problems or invaders.
malware code that is loaded before the OS is loaded
authentication device that sends out a signal to a reader
10 points
QUESTION 7
BitLocker Encryption can be used to secure a hard drive by encrypting the Windows volume and any other volumes present
True
False
QUESTION 8
Jailbreaking or rooting your phone causes it to run in "Administrator" or "Root" all the time, allowing all programs to execute, putting it at greater risk being compromised.
True
False
QUESTION 9
Data on a magnetic hard drive device cannot be destroyed.
True
False
QUESTION 10
Which of the following describes proving that an individual is who they say they are and is accomplished by a variety of techniques, including a username and password.
Authorization
Mandatory Access Lists
Authentication
Accounting
QUESTION 11
Quickest way to lock a workstation is to press the following keys:
WIN + L
CTRL + Backspace
CTRL + L
WIN + LOCK
1 points
QUESTION 12
Which of the following is disabled by default and should remain disabled?
Everyone account
Guest account
Standard account
Administrator account
1 points
QUESTION 13
Chain of custody ensures that which of the following is true?
Evidence will not be used in court
Evidence will be discarded
Evidence has been improperly secured
Possession of evidence is tracked
QUESTION 14
Encrypted File System (EFS) as encryption can be used with any file system to secure a file or entire folders.
True
False
QUESTION 15
When a TPM fails and bitlocker is used, the data is lost forever.
True
False
1 points
QUESTION 16
Which of the following is NOT an element of a secure password?
Mix of upper and lower case characters
Use of symbols
Eight or more characters in length
Consecutive letters or numbers
- A. B. C. D. E. F. G. H. I. J.BYOD
- A. B. C. D. E. F. G. H. I. J.LoJack
- A. B. C. D. E. F. G. H. I. J.degausser
- A. B. C. D. E. F. G. H. I. J.ACL
- A. B. C. D. E. F. G. H. I. J.keylogger
- A. B. C. D. E. F. G. H. I. J.rootkit
- A. B. C. D. E. F. G. H. I. J.smart card
- A. B. C. D. E. F. G. H. I. J.Wi-Fi Analyzer
- A. B. C. D. E. F. G. H. I. J.zero-day attack
- A. B. C. D. E. F. G. H. I. J.Software Piracy
A.Bring your own device
B.Access Control List
C.Software or hardware to read and record all keyboard entries
D.Device to erase platter hard drives
E.Hacker finds and exploits a vulnerability which there is no known defense or solution.
F.Theft, illegal copying, distribution or use of copyright software
G.Tracking/locationg software for stolen laptops
H.Software application which observes and collects data about Wi-Fi systems to try to troubleshoot problems or invaders.
I.malware code that is loaded before the OS is loaded
J.authentication device that sends out a signal to a reader
Explanation / Answer
QUESTION 7
BitLocker Encryption can be used to secure a hard drive by encrypting the Windows volume and any other volumes present
True
False
Answer:- False.
QUESTION 8 :
Jailbreaking or rooting your phone causes it to run in "Administrator" or "Root" all the time, allowing all programs to execute, putting it at greater risk being compromised.
True
False
Answer:- False.
QUESTION 9
Data on a magnetic hard drive device cannot be destroyed.
True
False
Answer:- True
QUESTION 10
Which of the following describes proving that an individual is who they say they are and is accomplished by a variety of techniques, including a username and password.
A. Authorization
B. Mandatory Access Lists
C. Authentication
D. Accounting
Answer:- A. Authorization
QUESTION 11
Quickest way to lock a workstation is to press the following keys:
A. WIN + L
B. CTRL + Backspace
C. CTRL + L
D. WIN + LOCK
Answer:- A. WIN + L
QUESTION 12
Which of the following is disabled by default and should remain disabled?
A. Everyone account
B. Guest account
C. Standard account
D. Administrator account
Answer :- B. Guest account
QUESTION 13
Chain of custody ensures that which of the following is true?
A. Evidence will not be used in court
B. Evidence will be discarded
C. Evidence has been improperly secured
D. Possession of evidence is tracked
Answer :- A. Evidence will not be used in court.
QUESTION 14
Encrypted File System (EFS) as encryption can be used with any file system to secure a file or entire folders.
True
False
Answer :- True.
QUESTION 15
When a TPM fails and bitlocker is used, the data is lost forever.
True
False
Answer :- False
QUESTION 16
Which of the following is NOT an element of a secure password?
A. Mix of upper and lower case characters
B. Use of symbols
C. Eight or more characters in length
D. Consecutive letters or numbers
Answer :- A. Mix of upper and lower case characters
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.