1.
What technology is also known as a hardware token?
Correct Answer
D. Security token
Explanation
A security token is also known as a hardware token because it is a physical device that is used to authenticate a user's identity and provide secure access to a system or network. It typically generates a unique code or password that is required to log in or perform certain actions. This hardware token adds an extra layer of security as it cannot be easily replicated or hacked, making it a reliable form of authentication.
2.
A fingerprint scanner is what type of device?
Correct Answer
C. Biometric
Explanation
A fingerprint scanner is classified as a biometric device because it uses unique physical characteristics, such as the pattern of ridges and valleys on a person's fingertip, to identify and authenticate individuals. Biometric devices are designed to capture and analyze biological data to verify a person's identity, making them a secure and reliable method of authentication. Therefore, the correct answer is biometric.
3.
What keystrokes are used to lock a Windows XP computer?
Correct Answer
C. CTRL+ALT+DEL
Explanation
To lock a Windows XP computer, the correct keystrokes are CTRL+ALT+DEL. This key combination brings up the Windows Security dialog box, where the user can choose to lock the computer by clicking on the "Lock Computer" option. This is a security feature that allows users to quickly lock their computer when they step away, preventing unauthorized access to their files and applications.
4.
To protect data so it cannot be easily read, what technology is used?
Correct Answer
B. Encryption
Explanation
Encryption is the technology used to protect data so that it cannot be easily read. It involves converting the information into an unreadable format using algorithms and keys. Only authorized individuals or systems with the correct decryption keys can access and understand the data. Encryption is widely used in various applications such as secure communication, online transactions, and data storage to ensure the confidentiality and integrity of sensitive information.
5.
An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do?
Correct Answer
A. Manually delete the file.
Explanation
If the antivirus application has detected a file as part of a virus but is unable to delete it, manually deleting the file would be the appropriate action to take. This involves locating the file in the system and deleting it manually to remove the potential threat. Re-partitioning the hard drive or reloading the operating system may not be necessary or effective in this scenario. Using a better antivirus application could be an option, but it is not mentioned as the immediate solution in this case.
6.
What Windows XP control panel can be used so the computer cannot be seen through My Network Places?
Correct Answer
A. Administrative Tools
Explanation
The correct answer is Administrative Tools. The Administrative Tools control panel in Windows XP allows users to manage various system settings and configurations. It does not directly control the visibility of the computer through My Network Places, but it provides access to other tools and settings that can be used to modify network visibility and sharing options. Therefore, by using the Administrative Tools control panel, users can configure the necessary settings to prevent the computer from being seen through My Network Places.
7.
What Windows XP feature allows file and folder encryption?
Correct Answer
B. EFS
Explanation
EFS stands for Encrypting File System, which is a feature in Windows XP that allows file and folder encryption. This feature provides a way to securely store sensitive data by encrypting it with a unique key, making it unreadable to unauthorized users. EFS helps protect data from being accessed or tampered with by encrypting it at the file level, ensuring that only authorized users with the appropriate encryption key can access the encrypted files and folders.
8.
Which statement is true regarding network shares?
Correct Answer
D. If a folder is shared, all subfolders are automatically shared.
Explanation
When a folder is shared on a network, it allows other users to access the contents of that folder. The statement "If a folder is shared, all subfolders are automatically shared" is true because when a folder is shared, the sharing settings can be applied to all subfolders within it. This means that the subfolders will also be accessible to other users on the network without the need for separate sharing settings. This simplifies the sharing process and allows for easier access to all the contents within the shared folder and its subfolders.
9.
Which of the following statements are true regarding encryption?
Correct Answer
C. You can encrypt someone else’s files if you have the correct permissions.
Explanation
The correct answer is that you can encrypt someone else's files if you have the correct permissions. This means that if you have the necessary access rights and permissions, you can encrypt files that belong to another user or account on the system. Encryption allows for the secure protection of sensitive data, and in Windows XP, it is possible to encrypt files belonging to others as long as you have the appropriate permissions granted to you.
10.
What security term defines what resources can be accessed and used?
Correct Answer
C. Authorization
Explanation
Authorization is the security term that defines what resources can be accessed and used. It is the process of granting or denying access to certain resources based on the user's identity, role, or other criteria. It ensures that only authorized individuals or entities are allowed to access specific resources, protecting sensitive information and preventing unauthorized use or misuse of resources.
11.
What is the minimum number of characters a password should be?
Correct Answer
D. 8
Explanation
A password should be at least 8 characters long to ensure a higher level of security. Shorter passwords are easier to guess or crack through brute force attacks. By setting a minimum length of 8 characters, it becomes more difficult for unauthorized individuals to gain access to the account or system.
12.
Why are words like monkey, smile, and freedom not good to use as passwords?
Correct Answer
A. There are in password crack dictionaries.
Explanation
The reason why words like monkey, smile, and freedom are not good to use as passwords is because they are present in password crack dictionaries. These dictionaries are commonly used by hackers and password cracking software to guess and crack passwords. Therefore, using these words as passwords makes it easier for unauthorized individuals to gain access to personal accounts and sensitive information.
13.
Which password would be most secure?
Correct Answer
B. 1adyVol3
Explanation
The password "1adyVol3" would be the most secure because it includes a combination of uppercase and lowercase letters, as well as numbers. This combination makes it harder for hackers to guess or crack the password. Additionally, the password is not a common word or phrase, further increasing its security.
14.
What should you do if someone is looking over your shoulder as you log onto your computer?
Correct Answer
D. Wait until they are not looking to type your password
Explanation
It is important to wait until the person is not looking to type your password because typing it while someone is looking over your shoulder increases the risk of them seeing and remembering your password. This can compromise the security of your computer and potentially lead to unauthorized access to your personal information. It is always best to ensure privacy when entering sensitive information like passwords.
15.
What type of userid and password is kept on a Windows XP computer?
Correct Answer
A. Local
Explanation
On a Windows XP computer, the type of userid and password that is kept is "local". This means that the user account and password are stored locally on the computer itself, and are not associated with a domain or an active directory. This type of account is typically used for individual users who do not need access to network resources or do not belong to a larger network infrastructure.
16.
What network environment has centralized servers for authentication?
Correct Answer
B. Domain
Explanation
A domain network environment has centralized servers for authentication. In a domain network, a central server called a domain controller is responsible for authenticating users and managing their access to network resources. This centralized authentication system allows for better security and easier management of user accounts and permissions.
17.
Another name for event logging is:
Correct Answer
D. None of the above
Explanation
The given question asks for another name for event logging. However, none of the provided options (authentication, authorization, encryption) are alternative names for event logging. Therefore, the correct answer is "none of the above".
18.
What security term describes scrambling data so it cannot be read?
Correct Answer
A. Encryption
Explanation
Encryption is the process of converting plain text or data into a coded form, known as ciphertext, to prevent unauthorized access. It ensures that only authorized individuals with the proper decryption key can access and read the data. By scrambling the data, encryption provides confidentiality and protects sensitive information from being understood or intercepted by unauthorized parties.
19.
Which file system allows administrators to assign permissions to control access to network resources including encryption?
Correct Answer
D. NTFS
Explanation
NTFS (New Technology File System) is the correct answer because it allows administrators to assign permissions to control access to network resources, including encryption. NTFS supports advanced security features such as file and folder permissions, encryption, and auditing. It provides a more robust and secure file system compared to other options like FAT32, EFS (Encrypting File System), and CDFS (Compact Disc File System). NTFS is commonly used in Windows operating systems to ensure data integrity and protect sensitive information from unauthorized access.
20.
Where could you see the people who have logged onto a computer in the past 48 hours?
Correct Answer
A. Event View security log
Explanation
The correct answer is Event View security log. The Event View security log is a tool in Windows operating systems that records security-related events, including user logins and logouts. By checking the Event View security log, you can see a list of people who have logged onto a computer in the past 48 hours. This log provides information such as the date and time of login, the user account used, and any relevant security events associated with the login.
21.
A wireless access point connects to the wired network. What can you do to prevent unauthorized users from accessing shared files on the wired network?
Correct Answer
C. Configure NTFS permissions on the shares
Explanation
To prevent unauthorized users from accessing shared files on the wired network, configuring NTFS permissions on the shares is the most effective solution. NTFS permissions allow you to control and restrict access to files and folders based on user accounts and groups. By properly configuring these permissions, you can specify who can read, write, modify, or delete files on the network. This ensures that only authorized users have access to the shared files, protecting sensitive information and preventing unauthorized access. Disabling SSID broadcasting, enabling encryption protocols, or installing a firewall can enhance network security but do not directly address access to shared files on the wired network.
22.
Which Windows XP control panel is used to configure the firewall?
Correct Answer
B. Security Center
Explanation
The correct answer is Security Center. The Security Center control panel in Windows XP allows users to configure the firewall settings. It provides information about the status of various security features on the computer, including the firewall, antivirus software, and automatic updates. By accessing the Security Center, users can enable or disable the firewall, customize its settings, and ensure that their computer is protected against unauthorized access and malicious attacks.
23.
What security term describes a program written to collect information and store it on the hard drive?
Correct Answer
C. Cookie
Explanation
A cookie is a small piece of data that is stored on a user's computer by a website. It is used to collect information and store it on the hard drive. Cookies are commonly used for authentication, tracking user preferences, and providing personalized experiences. While cookies are generally harmless, they can also be used for tracking and profiling users, which raises privacy concerns. Therefore, it is important for users to manage their cookies and be cautious of websites that may misuse them.
24.
Which technique provides more security for a wireless network?
Correct Answer
B. Enable WEP
Explanation
Enabling WEP (Wired Equivalent Privacy) provides more security for a wireless network compared to the other options listed. WEP is a security protocol that encrypts data transmitted over the network, making it difficult for unauthorized users to intercept and decipher the information. While WEP is not as secure as more modern encryption methods, it still offers a level of protection that disabling SSID broadcasting, enabling infrastructure mode, or changing the default password do not provide.
25.
A technique where an attacker captures a packet and uses computer information to pretend to be the sending computer is known as:
Correct Answer
B. Session hijacking
Explanation
Session hijacking is a technique where an attacker captures a packet and uses computer information to pretend to be the sending computer. This allows the attacker to gain unauthorized access to a session or session information, potentially allowing them to impersonate the user and perform malicious actions. It is a form of cyber attack that aims to compromise the integrity and confidentiality of a user's session.
26.
What type of scripts are Internet programs to make a web page dynamic?
Correct Answer
C. Active
Explanation
Active scripts are Internet programs that make a web page dynamic. These scripts are responsible for adding interactivity and functionality to web pages, allowing users to interact with the content and perform various actions. They can be used to validate forms, create animations, update content dynamically, and much more. Active scripts are essential for creating dynamic and engaging websites.
27.
What security term is used to describe logging keystrokes to obtain passwords?
Correct Answer
D. Spyware
Explanation
Spyware is the correct answer because it refers to a type of malicious software that is designed to secretly monitor and collect information from a user's computer. This can include logging keystrokes to obtain passwords and other sensitive information without the user's knowledge or consent.
28.
A lot of email comes to you from xxxpharmacy.com. This is an example of:
Correct Answer
A. Spamming
Explanation
The correct answer is spamming. This is because the question states that a lot of email comes from xxxpharmacy.com, indicating that the emails are unsolicited and likely unwanted. Spamming refers to the act of sending unsolicited and often irrelevant or inappropriate messages or advertisements to a large number of recipients.
29.
What type of unsolicited message type is designed to damage your computer?
Correct Answer
D. Malware
Explanation
Malware is a type of unsolicited message that is specifically designed to damage or disrupt a computer system. It includes various harmful software such as viruses, worms, Trojan horses, ransomware, and adware. These malicious programs can infiltrate a computer through various means, such as email attachments, infected websites, or software downloads. Once installed, malware can steal sensitive information, corrupt files, slow down the system, or even grant unauthorized access to hackers. Therefore, it is crucial to have proper antivirus software and regularly update it to protect against malware attacks.
30.
Which of the following is an example of social engineering?
Correct Answer
B. pHishing
Explanation
Phishing is a form of social engineering where attackers impersonate a trustworthy entity to deceive individuals into revealing sensitive information such as passwords, credit card details, or social security numbers. They typically use deceptive emails, messages, or websites that appear legitimate to trick victims into providing their personal information. Unlike spamming, spyware, or malware, which are more focused on spreading malicious software or unwanted content, phishing relies on manipulating human psychology and trust to exploit individuals for personal gain.
31.
Which of the following cannot be prevented through firewall, antivirus, antispyware, antigrayware, encryption, and domain authentication techniques?
Correct Answer
B. Social engineering
Explanation
Social engineering cannot be prevented through firewall, antivirus, antispyware, antigrayware, encryption, and domain authentication techniques because it involves manipulating and deceiving individuals to gain unauthorized access to sensitive information or systems. This type of attack relies on human interaction and psychological manipulation rather than technical vulnerabilities, making it difficult for traditional security measures to detect and prevent.
32.
Technology that allows you to create a tunnel from one network device to another over the Internet is:
Correct Answer
A. VPN
Explanation
A VPN, or Virtual Private Network, is a technology that allows users to create a secure and encrypted tunnel from one network device to another over the Internet. This enables users to access a private network remotely, ensuring that their data is protected and their online activities remain private. VPNs are commonly used by businesses and individuals to establish secure connections and protect sensitive information from unauthorized access or interception.
33.
What are the two original types of authentication used in wireless network?
Correct Answer
A. Open and shared
Explanation
The two original types of authentication used in wireless networks are "open" and "shared". "Open" authentication allows any device to connect to the network without providing any credentials. On the other hand, "shared" authentication requires a shared key or password to be entered by the user in order to connect to the network. This type of authentication provides a basic level of security by limiting access to authorized users who possess the shared key.
34.
What encryption is used with wireless networks?
Correct Answer
B. WEP
Explanation
WEP (Wired Equivalent Privacy) is the encryption used with wireless networks. It was one of the earliest encryption protocols used to secure wireless networks. However, WEP is now considered to be weak and easily crackable, as it has several vulnerabilities. Despite its weaknesses, it is still supported by some older devices and may be used in legacy systems.
35.
What is the difference between 40-bit and 64-bit WEP?
Correct Answer
D. There is no difference
Explanation
The correct answer is that there is no difference between 40-bit and 64-bit WEP. This means that both encryption methods have the same level of security and functionality. Both use the same initialization vector and do not have dynamically changing encryption keys.
36.
What statement is true regarding a firewall on a computer that attaches to the network wirelessly? Note that the wireless network connects to the wired network for Internet access.
Correct Answer
A. The firewall can protect the computer, but not the data sent between the computer and the access point
Explanation
The firewall can protect the computer from unauthorized access and malicious attacks, but it cannot encrypt or secure the data that is transmitted between the computer and the access point. Encryption and securing of data transmission is typically handled by other protocols and security measures such as VPNs or SSL/TLS.
37.
What is SSID broadcasting?
Correct Answer
C. The access point constantly sending the name of the wireless network into the air
Explanation
SSID broadcasting refers to the access point constantly sending the name of the wireless network into the air. This allows wireless devices to detect and connect to the network by displaying the available network names in their network list. It is a method used by access points to make the network easily discoverable by wireless devices.
38.
Which of the following cannot help when dealing with an irate customer?
Correct Answer
C. Arguing with the customer
Explanation
Arguing with the customer cannot help when dealing with an irate customer because it can escalate the situation further and make the customer even more upset. Arguing creates a confrontational environment and can damage the relationship with the customer. It is important to remain calm, listen attentively, and show empathy towards the customer's concerns in order to effectively resolve the issue and maintain a positive customer experience.
39.
You see a user’s password taped to the bottom of the keyboard. You should...
Correct Answer
B. Tell the user that you saw it and recommend that they change it and not write it down.
Explanation
The correct answer is to tell the user that you saw their password taped to the bottom of the keyboard and recommend that they change it and not write it down. This is the appropriate action because it promotes good security practices by discouraging the user from writing down their password and encourages them to create a stronger, more secure password. Additionally, informing the user directly allows for open communication and trust-building between the user and the IT professional.
40.
You are on a service call to fix a customer’s printer when they ask you to help with a network firewall issue. This is not part of your normal responsibilities. What should you do?
Correct Answer
A. Call your supervisor to find the best company resource to recommend to the customer.
Explanation
In this scenario, the best course of action is to call your supervisor to find the best company resource to recommend to the customer. As a service technician, it is important to focus on your assigned task and expertise. Helping with a network firewall issue is beyond your normal responsibilities, so it is appropriate to seek guidance from your supervisor. They can provide the necessary support and recommend the appropriate resources to assist the customer with their firewall issue.
41.
You are in a manager’s office on a service call and the manager is on a phone call talking about firing someone. What should you do?
Correct Answer
A. Quietly leave the room.
Explanation
In this situation, it is best to quietly leave the room. As a service call, it is not your place to be involved in the manager's conversation about firing someone. Interrupting or eavesdropping on the call would be unprofessional and inappropriate. By quietly leaving the room, you respect the manager's privacy and allow them to handle the call without any distractions or interruptions.