Security Pop Quiz Domain 5 for the CompTIA A+, Network+ and Microsoft Certifications

Similar documents
Configuring Windows 8 Course 20687A - Five days - Instructor-led - Hands-on

Pass Microsoft Exam

CompTIA A+ Certification ( ) Study Guide Table of Contents

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Security Essentials

Course Outline. Implementing and Managing Windows 10 Course C: 5 days Instructor Led

Configuring Windows 8

Exam /Course C or B Configuring Windows Devices

MIS NETWORK ADMINISTRATOR PROGRAM

Installing and Configuring Windows 10 5 Days, Instructor-led

COPYRIGHTED MATERIAL. Contents. Assessment Test

Implementing and Managing Windows 10

MU2b Authentication, Authorization and Accounting Questions Set 2

COURSE B: INSTALLING AND CONFIGURING WINDOWS 10

Installing and Configuring Windows 10

Course D:Implementing and Managing Windows 100

Course Outline. Installing and Configuring Windows 10 Course 20698A 5 days Instructor Led

Vendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo

Advanced Security Measures for Clients and Servers

Additional Bonus Exam 1 Questions

6293A Troubleshooting and Supporting Windows 7 in the Enterprise

Using Mobile Computers Lesson 12

COURSE 20698A: INSTALLING AND CONFIGURING WINDOWS 10

Microsoft Windows Operating System Fundamentals. Version: 10.0

Using Attix5 Pro with EFS

Security+ SY0-501 Study Guide Table of Contents

Exam Name: TS: Windows 7, Configuring

Configuring Windows Security Features

LabSim Mapping Matrix

Installing and Configuring Windows 10

CompTIA A+ Certification Support Skills (2012 Objectives)

Installing and Configuring Windows 10

Full file at Chapter 2: Securing and Troubleshooting Windows Vista

IT Essentials: PC Hardware and Software v4.1 Mapping to CompTIA A Objectives

CompTIA A Practical Application Exam, 2009 Edition

20698 Installing and Configuring Windows 10. Course Content. Course ID #: W Hours: 35. Course Description: At Course Completion:

Installing and Configuring Windows 7 Client

Implementing Security in Windows 2003 Network (70-299)

Implementing and Managing Windows 10

Mobility Windows 10 Bootcamp

Exam A. Number: Passing Score: 700 Time Limit: 120 min File Version: 1.0. Microsoft

Course : Installing and Configuring Windows 10

Microsoft Exam Security fundamentals Version: 9.0 [ Total Questions: 123 ]

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

SIMATIC. Industrial PC Microsoft Windows Embedded Standard 7. Safety instructions 1. Initial startup: Commissioning the operating.

Supporting and Troubleshooting Windows 10 va. Overview

Supporting Windows Vista and Applications in the Enterprise COURSE OVERVIEW PREREQUISITES AUDIENCE OBJECTIVES COURSE OUTLINE. Course No.

Forensics Challenges. Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation

Course: Windows 7 Enterprise Desktop Support Technician Boot Camp (MCITPWIN7)

20698A: Installing and Configuring Windows 10

Installing and Configuring Windows 10

Manually Unlock User Account Windows 7 Cmd Prompt

Course Outline 20698B

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

RICOH Unified Communication System. Security White Paper (Ver. 3.5) RICOH Co., Ltd.

"Charting the Course... MOC D Configuring Windows 8.1 Course Summary

Microsoft Configuring Windows 8.1

COURSE OUTLINE MOC 20697: INSTALLING AND CONFIGURING WINDOWS 10

CompTIA A Essentials Pop Quiz 1

Wireless for Windows 7

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Microsoft Questions $ Answers

CompTIA A+ Practical Application 2009 (with Windows 7 Updates)

Configuring File Server Resource Manager (FSRM)

CompTIA A+ Accelerated course for & exams

CompTIA A+ Practical Application Edition

COURSE 10982: SUPPORTING AND TROUBLESHOOTING WINDOWS 10

Sophos Central Device Encryption. Administrator Guide

Microsoft Windows Operating System Fundamentals

Course 10982B: Supporting and Troubleshooting Windows 10

Overview. Audience Profile. At Course Completion. Module Title : 10982B: Supporting and Troubleshooting Windows 10. Course Outline :: 10982B::

10982 Supporting and Troubleshooting Windows 10

Supporting and Troubleshooting Windows 10

Wireless Security Guide (for Windows XP, Windows Vista, Windows 7, Mac OSx)

Lenovo Europe, Middle East, and Africa Hardware Announcement ZG , dated January 27, 2009

WINDOWS 7 BITLOCKER DRIVE ENCRYPTION

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Cyber Security Practice Questions. Varying Difficulty

802.11N Wireless Broadband Router

COURSE OUTLINE: Supporting and Troubleshooting Windows 10

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Windows Server 2008 Administration

802.11N Wireless ADSL Router

Microsoft Questions $ Answers

Microsoft Installing and Configuring Windows 10

Windows 7 Configuration for ORU Wireless Networks

Software Vulnerability Assessment & Secure Storage

20698 Installing and Configuring Windows 10

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Supporting and Troubleshooting Windows 10

Course Outline (version 2)

Integration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker

Expert Reference Series of White Papers. BitLocker: Is It Really Secure? COURSES.

Configuring the WT-4 for ftp (Infrastructure Mode)

Instructions for connecting to the FDIBA Wireless Network (Windows Vista)

Installing and Configuring Windows 10

Apptix Online Backup by Mozy User Guide

6 Months Training Module in MS SQL SERVER 2012

Exam Questions

Chapter 7 Lab A: Exploring Encryption Methods

Transcription:

Security Pop Quiz Domain 5 for the CompTIA A+, Network+ and Microsoft Certifications Brought to you by www.rmroberts.com. This Security pop quiz is designed to evaluate your mastery of basic security principles related to the CompTIA A+, and Network+, and Microsoft Certifications. To better prepare yourself before attempting the security pop quiz, you may wish to complete the related CompTIA Network + - Domain 5 - Student Study Guide for the CompTIA A+. You can locate the study guide at the RMRoberts.com website or use the link above. 1. Which is the weakest encryption method? A. WEP B. L2TP C. PPTP D. PAP 2. An E-mail message content was encrypted using a private key. What would be used to decrypt the message? A. The matching private key. B. AES certificate C. Corresponding public key. D. WPA certificate. 3. What is another name for a wireless access point security key? A. AES certificate B. Passphrase C. Audit String D. Encrypt-phrase 4. Which security system requires an authentication server? A. WEP B. WPA C. 802.1x D. WAP 5. What does the acronym AES represent? A. Automated Encryption Service B. Advanced Encryption Standard C. Asynchronous Encryption Service D. Automated Encoded Service 1

6. Which security term is used to identify an email that extracts personal information from a user such as their social security number? A. Man in the middle. B. Smurf C. Phishing D. Trojan horse 7. Which program or utility provides the best protection from data loss caused by a virus? A. Action Center B. Firewall C. Backup and Restore D. User Account Control 8. What does the acronym EFS represent? A. Encoded File System B. Encrypted File System C. Entrusted File Security D. Enterprise File Security 9. Which proprietary encryption system is used by Windows Vista Ultimate to encrypt the entire contents of an entire hard disk drive? A. NTFS B. Kerberos C. BitLocker D. PGP 10. What does the acronym TPM represent? A. Temporary Protection Module B. Transmission Protection Management C. Trusted Platform Module D. Trusted Protection Management 11. Which Microsoft operating system first introduced the feature referred to as simple file sharing? A. Windows XP B. Windows Vista C. Windows 7 D. Windows 8 2

12. How are administrator shares identified? A. The name of the administrative shared is displayed in red letters. B. They are identified by a yellow exclamation mark. C. They are identified by a dollar sign. D. Administrative shares have no unique identification. 13. Which one is not a valid password characters? A. & B. # C. $ D. All are valid password characters. 14. What command entered into the Windows 7 search box will start the local group management policy editor? A.poledit.ini B. gpedit.msc C. sysedit D. Msconfig 15. Which security term refers to the verification of user identify? A. Encryption B. Accountability C. Authentication D. Permission 16. A user account name and password combination is an example of which? A. Permission B. Group membership C. Accountability D. Authentication 17. What does the acronym UAC represent? A. Unauthorized Access Control B. User Account Control C. Universal Account Control D. Unauthorized Access Core 3

18. Where do you configure advanced file sharing on a Windows 7 system? A. Vista System Firewall B. Network and Sharing Center C. Local Area Connection Dialog Box D. Network Properties Dialog Box 19. A technician moves a folder from one location to a different location on the same volume or partition. How are the folder permission affected? A. The folder retains its original set of permissions. B. The folder reverts to default permissions. C. The read only attribute is removed from the folder. D. The hidden file attribute is removed from the folder. 20. Which operating system first introduced the public folder? A. Windows 2000 B. Windows XP C. Windows Vista D. Windows 7 4

Answers 1. Which is the weakest encryption method? A. WEP 2. Email message content was encrypted using a private key. What would be used to decrypt the message? C. Corresponding public key. 3. What is another name for a wireless access point security key? B. Passphrase 4. Which security system requires an authentication server? C. 802.1x 5. What does the acronym AES represent? B. Advanced Encryption Standard 6. Which security term is used to identify an email that extracts personal information from a user such as their social security number? C. Phishing 7. Which program or utility provides the best protection from data loss caused by a virus? C. Backup and Restore 8. What does the acronym EFS represent? B. Encrypted File System 9. Which proprietary encryption system is used by Windows Vista Ultimate to encrypt the entire contents of an entire hard disk drive? C. BitLocker 10. What does the acronym TPM represent? C. Trusted Platform Module 11. Which Microsoft operating system first introduced the feature referred to as simple file sharing? A. Windows XP 5

12. How are administrator shares identified? C. They are identified by a dollar sign. 13. Which one is not a valid password characters? D. All are valid password characters. 14. What command entered into the Windows 7 search box will start the local group management policy editor? B. gpedit.msc 15. Which security term refers to the verification of user identify? C. Authentication 16. A user account name and password combination is an example of which? D. Authentication 17. What does the acronym UAC represent? B. User Account Control 18. Where do you configure advanced file sharing on a Windows 7 system? B. Network and Sharing Center 19. A technician moves a folder from one location to a different location on the same volume or partition. How are the folder permission affected? A. The folder retains its original set of permissions. 20. Which operating system first introduced the public folder? C. Windows Vista 6