Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please select the correct corresponding answer. Answers can only be used ONCE! B

ID: 3774590 • Letter: P

Question

Please select the correct corresponding answer. Answers can only be used ONCE!

BYOD

LoJack

degausser

ACL

keylogger

rootkit

smart card

Wi-Fi Analyzer

zero-day attack

Software Piracy

Bring your own device

Access Control List

Software or hardware to read and record all keyboard entries

Device to erase platter hard drives

Hacker finds and exploits a vulnerability which there is no known defense or solution.

Theft, illegal copying, distribution or use of copyright software

Tracking/locationg software for stolen laptops

Software application which observes and collects data about Wi-Fi systems to try to troubleshoot problems or invaders.

malware code that is loaded before the OS is loaded

authentication device that sends out a signal to a reader

10 points   

QUESTION 7

BitLocker Encryption can be used to secure a hard drive by encrypting the Windows volume and any other volumes present

True

False

QUESTION 8

Jailbreaking or rooting your phone causes it to run in "Administrator" or "Root" all the time, allowing all programs to execute, putting it at greater risk being compromised.

True

False

  

QUESTION 9

Data on a magnetic hard drive device cannot be destroyed.

True

False

QUESTION 10

Which of the following describes proving that an individual is who they say they are and is accomplished by a variety of techniques, including a username and password.

Authorization

Mandatory Access Lists

Authentication

Accounting

QUESTION 11

Quickest way to lock a workstation is to press the following keys:

WIN + L

CTRL + Backspace

CTRL + L

WIN + LOCK

1 points   

QUESTION 12

Which of the following is disabled by default and should remain disabled?

Everyone account

Guest account

Standard account

Administrator account

1 points   

QUESTION 13

Chain of custody ensures that which of the following is true?

Evidence will not be used in court

Evidence will be discarded

Evidence has been improperly secured

Possession of evidence is tracked

QUESTION 14

Encrypted File System (EFS) as encryption can be used with any file system to secure a file or entire folders.

True

False

QUESTION 15

When a TPM fails and bitlocker is used, the data is lost forever.

True

False

1 points   

QUESTION 16

Which of the following is NOT an element of a secure password?

Mix of upper and lower case characters

Use of symbols

Eight or more characters in length

Consecutive letters or numbers

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.   

BYOD

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.   

LoJack

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.   

degausser

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.   

ACL

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.   

keylogger

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.   

rootkit

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.   

smart card

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.   

Wi-Fi Analyzer

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.   

zero-day attack

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.   

Software Piracy

A.

Bring your own device

B.

Access Control List

C.

Software or hardware to read and record all keyboard entries

D.

Device to erase platter hard drives

E.

Hacker finds and exploits a vulnerability which there is no known defense or solution.

F.

Theft, illegal copying, distribution or use of copyright software

G.

Tracking/locationg software for stolen laptops

H.

Software application which observes and collects data about Wi-Fi systems to try to troubleshoot problems or invaders.

I.

malware code that is loaded before the OS is loaded

J.

authentication device that sends out a signal to a reader

Explanation / Answer

QUESTION 7

BitLocker Encryption can be used to secure a hard drive by encrypting the Windows volume and any other volumes present

True

False

Answer:- False.

QUESTION 8 :

Jailbreaking or rooting your phone causes it to run in "Administrator" or "Root" all the time, allowing all programs to execute, putting it at greater risk being compromised.

True

False

Answer:- False.

QUESTION 9

Data on a magnetic hard drive device cannot be destroyed.

True

False

Answer:- True

QUESTION 10
Which of the following describes proving that an individual is who they say they are and is accomplished by a variety of techniques, including a username and password.
    A.   Authorization
    B.   Mandatory Access Lists
    C.   Authentication
    D.   Accounting

Answer:- A.   Authorization

QUESTION 11
Quickest way to lock a workstation is to press the following keys:
    A.   WIN + L
    B.   CTRL + Backspace
    C.   CTRL + L
    D.   WIN + LOCK

Answer:- A.   WIN + L

QUESTION 12
Which of the following is disabled by default and should remain disabled?
    A.   Everyone account
    B.   Guest account
    C.   Standard account
    D.   Administrator account

Answer :- B.   Guest account

QUESTION 13
Chain of custody ensures that which of the following is true?
    A.   Evidence will not be used in court
    B.   Evidence will be discarded
    C.   Evidence has been improperly secured
    D.   Possession of evidence is tracked

Answer :- A.   Evidence will not be used in court.

QUESTION 14
Encrypted File System (EFS) as encryption can be used with any file system to secure a file or entire folders.
True
False

Answer :- True.

QUESTION 15
When a TPM fails and bitlocker is used, the data is lost forever.
True
False

Answer :- False

QUESTION 16
Which of the following is NOT an element of a secure password?
    A.   Mix of upper and lower case characters
    B.   Use of symbols
    C.   Eight or more characters in length
    D.   Consecutive letters or numbers

Answer :- A.   Mix of upper and lower case characters

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote