ログイン

CompTia IT Fundamentals (Chapter 9 Review Questions)

CompTia IT Fundamentals (Chapter 9 Review Questions)
7問 • 2年前
  • Destiny Murray
  • 通報

    問題一覧

  • 1

    The system administrator in your quits unexpectedly in the middle of the day. It’s quickly apparent that he changed the server password and no one knows what it is. What might you do in this type of situation?

    Use a password cracker to find the password.

  • 2

    Rose just installed a new search engine on her laptop. Now whenever she searches the Internet, she gets several pop-up windows directing her to websites to buy products. What does Rose have?

    Adware

  • 3

    What is it called when a co-worker sitting next to you always seems to look your way when you try to enter your user ID and password to log onto the network?

    Shoulder Surfing

  • 4

    You want to ensure that a project team can only access the files specifically created for them, and no other files. Which term is most correct in describing this configuration?

    Least Privilege Model

  • 5

    What is the name of an application that appears to look like a helpful application but instead does harm to your computer?

    Trojan Horse

  • 6

    What type of malware is best known for carrying other malware as a payload?

    Worm

  • 7

    Which of the following are activities that a hacker might attempt?

    Stealing usernames are activies that a hacker might attempt, Stealing usernames and passwords, Modifying website content, Disrupting network communications, Analyzing network traffic

  • CompTia IT Fundamentals (Chapter 1- Chapter 2)

    CompTia IT Fundamentals (Chapter 1- Chapter 2)

    Destiny Murray · 34問 · 2年前

    CompTia IT Fundamentals (Chapter 1- Chapter 2)

    CompTia IT Fundamentals (Chapter 1- Chapter 2)

    34問 • 2年前
    Destiny Murray

    CompTia IT Fundamentals (Chapter 3 and Chapter 4)

    CompTia IT Fundamentals (Chapter 3 and Chapter 4)

    Destiny Murray · 28問 · 2年前

    CompTia IT Fundamentals (Chapter 3 and Chapter 4)

    CompTia IT Fundamentals (Chapter 3 and Chapter 4)

    28問 • 2年前
    Destiny Murray

    CompTia IT Fundamentals (Chapter 5 and Chapter 6)

    CompTia IT Fundamentals (Chapter 5 and Chapter 6)

    Destiny Murray · 11問 · 2年前

    CompTia IT Fundamentals (Chapter 5 and Chapter 6)

    CompTia IT Fundamentals (Chapter 5 and Chapter 6)

    11問 • 2年前
    Destiny Murray

    CIS101A Computer Hardware Fundamentals (Chapter 1-Chapter 2)

    CIS101A Computer Hardware Fundamentals (Chapter 1-Chapter 2)

    Destiny Murray · 29問 · 2年前

    CIS101A Computer Hardware Fundamentals (Chapter 1-Chapter 2)

    CIS101A Computer Hardware Fundamentals (Chapter 1-Chapter 2)

    29問 • 2年前
    Destiny Murray

    CompTia Fundamentals Practice

    CompTia Fundamentals Practice

    Destiny Murray · 71問 · 2年前

    CompTia Fundamentals Practice

    CompTia Fundamentals Practice

    71問 • 2年前
    Destiny Murray

    Quiz 220-1102 CompTia A+ Test Prep (Complex)

    Quiz 220-1102 CompTia A+ Test Prep (Complex)

    Destiny Murray · 12問 · 2年前

    Quiz 220-1102 CompTia A+ Test Prep (Complex)

    Quiz 220-1102 CompTia A+ Test Prep (Complex)

    12問 • 2年前
    Destiny Murray

    問題一覧

  • 1

    The system administrator in your quits unexpectedly in the middle of the day. It’s quickly apparent that he changed the server password and no one knows what it is. What might you do in this type of situation?

    Use a password cracker to find the password.

  • 2

    Rose just installed a new search engine on her laptop. Now whenever she searches the Internet, she gets several pop-up windows directing her to websites to buy products. What does Rose have?

    Adware

  • 3

    What is it called when a co-worker sitting next to you always seems to look your way when you try to enter your user ID and password to log onto the network?

    Shoulder Surfing

  • 4

    You want to ensure that a project team can only access the files specifically created for them, and no other files. Which term is most correct in describing this configuration?

    Least Privilege Model

  • 5

    What is the name of an application that appears to look like a helpful application but instead does harm to your computer?

    Trojan Horse

  • 6

    What type of malware is best known for carrying other malware as a payload?

    Worm

  • 7

    Which of the following are activities that a hacker might attempt?

    Stealing usernames are activies that a hacker might attempt, Stealing usernames and passwords, Modifying website content, Disrupting network communications, Analyzing network traffic