1.
All of the following are part of securing a Windows computer except:
Correct Answer
D. Shutting down the computer every night
Explanation
Shutting down the computer every night is not directly related to securing a Windows computer. While it is good practice to shut down the computer when not in use to conserve energy and prolong the lifespan of the hardware, it does not directly contribute to the security of the computer. The other options listed, such as limiting the use of admin accounts, setting up individual accounts, and setting strong passwords, are all important security measures that help protect the computer from unauthorized access and potential security breaches.
2.
It is not necessary to install a personal firewall.
Correct Answer
B. False
Explanation
Installing a personal firewall is necessary for ensuring the security of personal devices and networks. A personal firewall acts as a barrier between the device and the internet, monitoring incoming and outgoing network traffic and blocking any unauthorized access or malicious activities. It helps protect against various threats such as hackers, malware, and unauthorized data transfers. Without a personal firewall, devices are more vulnerable to attacks and can be easily compromised. Therefore, the correct answer is False, indicating that it is necessary to install a personal firewall.
3.
Once you install Antivirus or anti-adware software you don’t need to worry about it anymore.
Correct Answer
B. False
Explanation
Installing antivirus or anti-adware software does not mean that you no longer need to worry about it. While these software can provide protection against viruses and adware, they still require regular updates and scans to ensure their effectiveness. New threats are constantly emerging, and without regular updates, the software may not be able to detect or remove them. Additionally, user behavior and safe internet practices also play a crucial role in maintaining security. Therefore, it is important to remain vigilant and take necessary precautions even after installing antivirus or anti-adware software.
4.
In order to “plug up” any security holes in your Windows Operating System always.
Correct Answer
C. Keep Windows updates current
Explanation
Keeping Windows updates current is important for plugging up security holes in the Windows Operating System. Windows updates often include patches and fixes for known vulnerabilities, which helps to protect the system from potential threats. By regularly installing these updates, users can ensure that their operating system is up to date and better equipped to defend against security breaches.
5.
There are settings in Internet Explorer to make it more secure.
Correct Answer
A. True
Explanation
Internet Explorer has various settings that can be adjusted to enhance its security. These settings include options to enable/disable security features, manage pop-up blockers, control cookie handling, and configure security zones. By customizing these settings, users can strengthen the security of their browsing experience and protect against potential threats such as malware, phishing, and unauthorized access to personal information. Therefore, the statement "There are settings in Internet Explorer to make it more secure" is true.
6.
One way to try to avoid malicious attacks is to use alternatives to Internet Explorer and Outlook or Outlook Express such as Firefox or Eudora. Why?
Correct Answer
A. Firefox and Eudora are less popular therefore not as targeted
Explanation
Firefox and Eudora are less popular compared to Internet Explorer and Outlook or Outlook Express. Malicious attackers often target widely used software because it offers a larger user base to exploit. By using alternatives like Firefox and Eudora, which are less popular, the chances of being targeted by such attacks decrease. Therefore, using these alternatives can be a way to avoid malicious attacks.
7.
If you have current antivirus and up-to-date operating system, you can open any email attachments and recklessly go to any website.
Correct Answer
B. False
Explanation
Having a current antivirus and up-to-date operating system does not guarantee complete protection against all threats. While it reduces the risk of malware and viruses, it does not eliminate it entirely. Opening any email attachments and visiting any website recklessly can still expose you to potential risks, such as phishing attacks or zero-day exploits. Therefore, it is not advisable to engage in such behavior, even with a current antivirus and up-to-date operating system.
8.
Data can be encrypted using which of the following:
Correct Answer
D. Windows Encrypted Files System (EFS)
Explanation
Data can be encrypted using the Windows Encrypted Files System (EFS). EFS is a feature of the Windows operating system that allows users to encrypt files and folders on their computer. This encryption ensures that only authorized users with the correct encryption key can access the data. Antivirus and software-based firewalls are not specifically designed for data encryption, although they play a role in overall data security. Symantec Encryptomagic is not a commonly known or widely used encryption tool.
9.
It is a good idea to physically protect equipment using which of the following:
Correct Answer
A. Cables that lock down cases
Explanation
Physically protecting equipment is important to prevent theft or unauthorized access. One effective way to do this is by using cables that lock down cases. This involves securing the equipment to a fixed object using a cable and lock, making it difficult for thieves to steal or tamper with the equipment. This method provides an added layer of security and ensures that the equipment remains in place and protected.
10.
Which of the following are Social Engineering techniques used to get personal information?
Correct Answer
D. All of the above
Explanation
Phishing, spamming, and virus hoaxes are all examples of social engineering techniques used to obtain personal information. Phishing involves tricking individuals into revealing sensitive information by impersonating a trustworthy entity. Spamming refers to the mass sending of unsolicited messages, often containing malicious links or requests for personal information. Virus hoaxes aim to deceive users into believing they are at risk of a computer virus, prompting them to disclose personal details. Therefore, all three options mentioned in the question are correct social engineering techniques for obtaining personal information.
11.
Always keep good backups of your data and system state.
Correct Answer
A. True
Explanation
It is important to always keep good backups of your data and system state to ensure that you can recover your information in case of any data loss or system failure. Backups help to protect against accidental deletion, hardware failure, software corruption, and other unforeseen events. By regularly backing up your data and system state, you can minimize the risk of losing important information and ensure that you can quickly restore your system to a previous working state if needed.
12.
It is a good idea to monitor the following within the event log.
Correct Answer
D. All of the above
Explanation
Monitoring logon failures, access to files and folders, and changes to startup procedures within the event log is a good idea because it allows for the detection and investigation of potential security breaches or unauthorized activities. By monitoring logon failures, organizations can identify and respond to any suspicious or unsuccessful login attempts. Monitoring access to files and folders helps ensure that only authorized individuals are accessing sensitive data. Changes to startup procedures can indicate the presence of malware or unauthorized modifications to the system. Therefore, monitoring all of these activities can contribute to maintaining the security and integrity of the system.
13.
Once you remove the hard drive from the computer, it is unreadable and can be discarded with no worries of data being extracted.
Correct Answer
B. False
Explanation
The statement is false because even if the hard drive is removed from the computer, the data can still be extracted using specialized tools and techniques. Simply discarding the hard drive does not guarantee that the data on it cannot be accessed. It is important to properly wipe or destroy the hard drive to ensure that the data is not recoverable.
14.
The safest form of authentication to a network is
Correct Answer
D. Smart cards, or bio-metric scanners/data
Explanation
Smart cards, or bio-metric scanners/data, are considered the safest form of authentication to a network. This is because they provide an additional layer of security beyond just passwords. Smart cards are physical devices that store authentication information and require physical possession to access the network. Bio-metric scanners/data, on the other hand, use unique physical characteristics of individuals, such as fingerprints or iris patterns, to verify their identity. Both methods are difficult to replicate or fake, making them highly secure forms of authentication.
15.
All of the following are malicious software except:
Correct Answer
E. They are all malicious software
Explanation
The given answer is incorrect. The question asks for an exception among the listed options, and the correct answer is "Spam." While browser hijackers, Trojan horses, and adware are all types of malicious software, spam refers to unsolicited and often unwanted email messages. Although spam can sometimes contain malicious content or links, it is not classified as a type of software.
16.
It is critical to always keep your firewall, antivirus, and anti-adware up to date.
Correct Answer
A. True
Explanation
Keeping your firewall, antivirus, and anti-adware up to date is critical because it helps protect your computer and network from potential threats, such as viruses, malware, and unauthorized access. Regular updates ensure that your security software has the latest patches and definitions to detect and block new and emerging threats. Neglecting to update these protective measures can leave your system vulnerable to attacks and compromise your data and privacy. Therefore, it is important to always keep your firewall, antivirus, and anti-adware up to date.
17.
FTP uses the following port:
Correct Answer
C. 21
Explanation
FTP (File Transfer Protocol) uses port 21. This port is specifically designated for FTP control commands and is used to establish a connection between the FTP client and server. The FTP control connection is responsible for sending commands from the client to the server and receiving responses back. Once the control connection is established, data transfer can occur over a separate data connection using a different port. Port 21 is the standard port for FTP, but it can be configured to use a different port if needed.
18.
SFTP uses the following port:
Correct Answer
D. 22
Explanation
SFTP uses port 22 because it is a secure file transfer protocol that uses SSH (Secure Shell) for authentication and data encryption. Port 22 is the default port for SSH, and SFTP utilizes this port to establish a secure connection between the client and the server for secure file transfers.
19.
HTTP uses the following port:
Correct Answer
A. 80
Explanation
HTTP (Hypertext Transfer Protocol) uses port 80. Ports are used to establish communication between different applications on a computer network. In the case of HTTP, port 80 is specifically assigned for this protocol. It allows web browsers to connect to web servers and retrieve web pages. By using port 80, HTTP ensures that the data is transmitted correctly between the client (web browser) and the server (web server).
20.
Remote Desktop uses the following port:
Correct Answer
A. 3389
Explanation
Remote Desktop uses port 3389 for communication. This port is specifically designated for Remote Desktop Protocol (RDP) connections, allowing users to remotely access and control a computer or server. By using port 3389, Remote Desktop establishes a secure and encrypted connection between the local and remote machines, enabling users to view and interact with the remote desktop as if they were physically present at that location.