CompTIA A+ 220-1001 & 220-1002 A+ 1002: CH13 Review
This flashcard set reviews security and hardware concepts from Chapter 13 of the CompTIA A+ 220-1002 exam, including trusted platform modules (TPM), secure boot, and system integrity checks. Ideal for strengthening your security fundamentals.
What chip on the Motherboard validates on Boot that you still have the same Operating System installed and that the computer was not hacked by some malevolent program?
Southbridge
TPM
GPU
Northbridge
TPM
Key Terms
What chip on the Motherboard validates on Boot that you still have the same Operating System installed and that the computer was not hacked by some malevolent program?
Southbridge
TPM
GPU
Northbridge
TPM
How are libraries folders displayed in Windows File Explorer?
Double click on Favorites and click Show Libraries in the Dialog Box
Navigate to the Folder C:\Users\MyLibraries
Right-Click in the Navigation Section and click Show Libraries.
Simply Open File Explorer; they display automatically.
Right-Click in the Navigation Section and click Show Libraries
What tool is offered by Windows Ultimate and Enterprise editions to encrypt entire hard drives?
NTFS
TrueCrypt
TPMs
BitLocker
BitLocker
Which term refers to a unique combination of a user name and an associated password?
User Account
User Identity
User Authorization
User Authentication
User Account
In Windows 7, which UAC Notification level is the Default Setting?
Always Notify
Notify me only when programs try to make changes (do not dim to my desktop)
Notify me only when programs try to make changes
Never Notify
Notify me only when programs try to make changes
What techniques provide the only true way to protect your data from access by any other user?
Regular Backups
Authorization
Authentication
Encryption
Encryption
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
What chip on the Motherboard validates on Boot that you still have the same Operating System installed and that the computer was not hacked by some malevolent program? Southbridge | TPM |
How are libraries folders displayed in Windows File Explorer? Double click on Favorites and click Show Libraries in the Dialog Box | Right-Click in the Navigation Section and click Show Libraries |
What tool is offered by Windows Ultimate and Enterprise editions to encrypt entire hard drives? NTFS | BitLocker |
Which term refers to a unique combination of a user name and an associated password? User Account | User Account |
In Windows 7, which UAC Notification level is the Default Setting? Always Notify | Notify me only when programs try to make changes |
What techniques provide the only true way to protect your data from access by any other user? Regular Backups | Encryption |
What character in a password is most helpful in defeating common word hacks? 3 | @ |
A strong password is atleast _______ characters long and contains letters, numbers, and punctuation symbols? 256 | 8 |
Authorization for Windows’ files and folders is controlled by the ______ file system, which assigns permissions to users and groups? NTFS | NTFS |
Created automatically by Windows, _____ give local administrators access to resources whether they log on locally or remotely? Public Folders | Administrative Shares |
How many notification levels of UAC did Microsoft include in Windows 7? Two | Four |
An unpopular, but necessary, security features introduced in Windows Vista was _______? NTFS | UAC |
By default who has complete control over a folder or file? Administrator | Owner |
On every Windows System, each record in an encrypted database of user names and passwords is called an ______? Group Account | Local User Account |
Which Linux command enables you to change the owner and the group which a file and folder is associated? crontab | chown |
Selecting _____ while adding a new user in Windows makes that user a member of the Local Users Group? restricted user | standard user |
What process determines what a legitimate user can and cannot do on a system? Inheritance | Authorization |
What two sets of data does every folder and file on an NTFS partition list? Encryption and decryption attributes | User and Group access and level of access |
Opening a Command-Line and running ______ provides access to a utility called Local Security Policy? dir /p | secpol.msc |
With the ______ permission for an NTFS partition, you can give or take away permissions for other accounts? Read & Execute | Change |
What process is described as a File or Folder automatically getting all the NTFS Permission of the Parent folder? Traversal | Inheritance |
What unique key is known only by the system and the person with whom the key is associated? Token | Password |
Which string displayed using the ls -l command in a Linux Terminal indicates that group permissions are set to read and modify?
| -rw-rw-r– |
What 3 letters are used in a Linux Terminal to indicate permissions associated with a file or folder? awk | rwx |
Which NTFS Permission for a folder is defined as enabling you to Read, Write, and Delete both files and subfolders? List Folder Contents | Modify |
What process identifies and grants access to a user who is trying to access a system? Authorization | Authentication |
A password _ policy forces users to select a new password periodically? anti-hack | expiration |
What happens to a file or folder permission if it is copied within an NTFS partition? Both original and copy inherit permissions from the new location | The original retains permissions, and the copy inherits permissions from the new location |
Windows administration allows a certain level of access for a file or folder to be assigned to an rather than just a single user account? owner | group |
When you create a new file or folder on an NTFS partition, you become the of that file or folder? owner | owner |
What does BitLocker require on a motherboard to validate on boot that a Windows computer has not been changed? Core i7 | TPM |
What is the Primary Tool Windows uses for providing Authorization? NTFS | NTFS |
Which NTFS Permission allows an account to seize control of a file or folder owned by another account? Folder Permissions | Take Ownership Permission |