Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Login

Register Now

Welcome to All Test Answers

Assignment 9-Chapter 9 Security Essentials

Question 1
1 out of 1
points

An RFID badge is related to which type of
authentication method? Page 442
Answer
Selected Answer:

 c.
smart card

Question 2
1 out of 1
points

Which command can you perform at the Windows RE
command prompt to repair the OS boot record on Windows 7? Page 462
Answer
Selected Answer:

 d.
bootrec /fixboot

Question 3
1 out of 1
points

You should beware of a person attempting to use
your computer after you step away from it, a term referred to as which of the
following? Page 446
Answer
Selected Answer:

 d.
tailgating

Question 4
1 out of 1
points

A privacy filter is used for what aspect of
security? Page 444
Answer
Selected Answer:

 c.
screen viewing

Question 5
1 out of 1
points

Using Group Policy, you can set security policies
to help secure a workstation. Page 436
Answer
Selected Answer:

 True

Question 6
1 out of 1
points

On a peer-to-peer network, authentication is the
responsibility of the domain. Page 426
Answer
Selected Answer:

 False

Question 7
1 out of 1
points

What keystroke should you press to get a logon
window if you don’t use the welcome screen? Page 427
Answer
Selected Answer:

 b.
Ctrl+Alt+Delete

Question 8
1 out of 1
points

After initially installing Windows 7, you need to
disable the Guest account so nobody can use it. Page 430
Answer
Selected Answer:

 False

Question 9
1 out of 1
points

Requiring users to press Ctrl+Alt+Delete to get a
logon window is more secure than the welcome screen. Page 427
Answer
Selected Answer:

 True

Question 10
1 out of 1
points

Which of the following provides a strong magnetic
field used to completely erase data on a hard drive or tape drive? Page 445
Answer
Selected Answer:

 d.  degausser

Question 11
1 out of 1
points

Which of the following is true about the Guest
account in Windows 7? Page 430, 437
Answer
Selected Answer:

 b.
it is disabled by default

Question 12
1 out of 1
points

It’s usually a good idea to run several
anti-malware programs at the same time on your computer. Page 463
Answer
Selected Answer:

 False

Question 13
1 out of 1
points

If you don’t want to use BitLocker to protect
your computer, you can still configure a power-on password using which of the
following? Page 440
Answer
Selected Answer:

 d.
the BIOS

Question 14
1 out of 1
points

If you want your computer to be protected by
BitLocker Encryption using computer authentication, what feature must your
computer have? Page 439
Answer
Selected Answer:

 a.
a TPM chip on the motherboard

Question 15
1 out of 1
points

Which type of malware can hijack internal Windows
components and often goes undetected because it is already loaded when the
antivirus software loads? Page 448
Answer
Selected Answer:

 b.
rootkit

Question 16
1 out of 1
points

If you need to understand the parent-child
relationships between running processes and view parent processes as they
call other processes, what tool should you use? Page 460
Answer
Selected Answer:

 a.
Process Explorer

Question 17
1 out of 1
points

Which of the following is NOT true about using
Group Policy on business and professional editions of Windows? Page 437-438
Answer
Selected Answer:

 b.
you can use gpedit.msc to see
if any policies conflict

Question 18
1 out of 1
points

Which of the following is true about the Windows
Encrypted File System? Page 432
Answer
Selected Answer:

 a.
an encrypted file moved to an
unencrypted folder remains encrypted

Question 19
1 out of 1
points

Which of the following is true about passwords.
Page 431-432
Answer
Selected Answer:

 c.
by default, accounts with a
blank password cannot logon remotely

Question 20
1 out of 1 points

Which type of malware hides in the MBR program of
a hard drive? Page 448
Answer
Selected Answer:

 a.
boot sector virus

Question 21
1 out of 1
points

One way to authenticate users on a computer is to
use a small device that contains authentication information.  What is
this device called? Page 441
Answer
Selected Answer:

 b.
smart card

About

Leave a reply

Captcha Click on image to update the captcha .

error: Content is protected !!