Question | Answer |
1What is Authorization? A. Proving something or something is what they claim to be B. Proving someone or something has permission to access the resource C. Proving someone or something is what they claim to be D. Proving someone or something not virus | B. Providing someone or something has permission to access the resource. |
What is authentication? A. Proving something or something is what they claim to be B. Proving someone or something has permission to access the resource C. Proving someone or something is what they claim to be D. Proving someone or something not virus | A. Proving someone or something is what they claim to be. |
3. How can you ensure your password is a strong password? A. Use more than eight characters B. use both numbers and letters C. Use symbols D. Use all of the above | D. Use all of the above |
4. You should educate your users on the proper way to... A. Protect their passwords B. Use both numbers and letters C. Avoid social engineering attacks D. All of the above | D. Use all of the above |
5. What dose HIPAA stand for? A. Hazardous Ingredient Prevention Act of America B. Human Information Proper Authorization Act C. Health Insurance Portability and Accountability Act D. Highly Infectious Paperwork Aggregation Act | C. Health Insurance Portability and Accountability Act |
6. If you grant the "Co-Owner" role to the "Everyone" group for a folder in Windows 7, Who has permission to modify the contents of that folder? A. Everyone B. Everyone in the Everyone group C. Anybody who's anybody D. No one, it doesn't work that way | A everybody |
7. Which of the following is a special character? A. Y B. 4 C. F11 D. * | D. * |
8. Which of the following is a valid account in Windows 7? A. limited Account B. Power User Account C. Backup Operator D. None of the above | D. None of the above |
9. A Smart Card is also called what? A. A CHAP B. A token C. An Authorizer D. A dumb card | B. A Token |
10. A strong password... A. is difficult to guess B. contains your birthday C. has a word from the dictionary D. uses only lowercase letters | A. Is difficult to guess |
11. Encryption is putting data into a form that can't be read without a key and an algorithm. T/F | T |
12. CHAP is a protocol for encryption data as it moves across a network. T/F | T |
13. KERBEROS is a protocol for encrypting data as it moves across a network. T/F | T |
14. Users have rights, resources have permissions. T/F | T |
15. Pressing the Windows key and "L" at the same time will lock your desktop. T/F | T |
16. A passphrase allows a user to use several words separated by spaces instead of a plain password. T/F | T |
17. Spam is a virus which disguises itself as a legitimate program. T/F | F |
18. A phishing attack is when an email appears to be genuine, but is only trying to trick you into giving away sensitive information. T/F | T |
19. A BIOS password is the only way to completely protect your computer from attacks. T/F | F |