CompTIA A+ 220-801 & 220-802 - Chapter 16 - Security

18 cards   |   Total Attempts: 188
  

Related Topics

Cards In This Set

Front Back
Which of the following types of malware self-replicates?
Worm
What type of malware is the abuse of electronic messaging systems?
Spam
Which of the following are symptoms of viruses?
Computer runs slowly
Computer locks up
Unusual error messages are displayed
Which if the following is the science if recognizing humans based on physical characteristics?
Biometrics
A hard drive needs to be disposed of in a way so that no one can access the data. Which method should you use?
Destruction
Which of the following is the best mode to use when scanning for viruses?
Safe Mode
Which of the following is one was to prevent spyware?
Adjust the Internet Explorer security settings
One of your customers tells you that a bank employee called and asked for the person's bank balance and telephone number. What is this an example of?
Social Engineering
Which of the following is the strongest password?
ThisIsV#ryS3cure
Which of these is a security component of Windows 7/Vista?
UAC
A customer complains that while away at at lunch someone used his somputer to send emails to other co-workers without his knowledge. What should you recommend?
Use the Windows lock feature
Which of the following best describes encryption?
Prevents unauthorized users from viewing or reading data?
One of the users on your network is trying to access files shared on a remote computer. The file's share permissions allow the user full control. But, NTFS permissions allow the user Read access. What will be the resulting access for the user?
Read
You are the administrator for your network. You set up an administrative share called Data$. What is necessary for another user to access this share?
The user must be part of the HomeGroup
The user must know the exact network path to the share
Which is the following describes an attempt to guess a password by using a combination of letters and numbers?
Brute force