Back to AI Flashcard MakerInformation Technology /CompTIA A+ 220-1001 & 220-1002 A+ 1002: CH27 Review

CompTIA A+ 220-1001 & 220-1002 A+ 1002: CH27 Review

Information Technology28 CardsCreated 3 months ago

This flashcard set covers environmental and safety standards from Chapter 27 of the CompTIA A+ 220-1002 exam, focusing on ideal humidity levels for computer equipment to prevent damage and maintain optimal performance.

What is the correct humidity range for Computer Equipment?

0 - 20%
30 - 40%
60 - 80%
10 - 20%

30 - 40%

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/28

Key Terms

Term
Definition

What is the correct humidity range for Computer Equipment?

0 - 20%
30 - 40%
60 - 80%
10 - 20%

30 - 40%

Not all _____ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information?

unauthorized

Microsoft’s Encryption method of choice for WAN is _______?

Kerberos
MS-CHAP
IPsec
CHAP

IPsec

What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?

Virus
Spyware
Trojan
Worm

Virus

Both wired and wireless networks can use ______ or port security to enable you to blacklist or whitelist devices?

port filtering
MAC filtering
software authentication
two-factor authentication

MAC filtering

Physical Security, Authentication, Users and Groups, and Security Policies are all aspects of _______?

environmental controls
access control
database management
network locks

access control

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

What is the correct humidity range for Computer Equipment?

0 - 20%
30 - 40%
60 - 80%
10 - 20%

30 - 40%

Not all _____ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information?

unauthorized

Microsoft’s Encryption method of choice for WAN is _______?

Kerberos
MS-CHAP
IPsec
CHAP

IPsec

What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?

Virus
Spyware
Trojan
Worm

Virus

Both wired and wireless networks can use ______ or port security to enable you to blacklist or whitelist devices?

port filtering
MAC filtering
software authentication
two-factor authentication

MAC filtering

Physical Security, Authentication, Users and Groups, and Security Policies are all aspects of _______?

environmental controls
access control
database management
network locks

access control

A user has a credit card-sized card used to prove her identity with a PIN. What is this card called?

Biometric Card
Authorization Card
Task Card
Smart Card

Smart Card

A hardware firewall ______?

uses hardware to recover from effects of viruses
uses replicated hardware for security
disconnects hardware from the internet
inspects incoming packets individually

inspects incoming packets individually

Most Websites today use _______ to encrypt connections?

DLP
IPS
TLS
PAP

TLS

Which current authentication method is typically used over a LAN?

CHAP
MS-CHAP
Kerberos
PAP

Kerberos

What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?

Trojan
Spyware
Worm
Virus

Worm

An intrusion prevention system will ______?

prevent intrusion and also stop attacks as they are occurring
provide batch warnings, but not operate in real-time
prevent network intrusion by shutting down your computer
only prevent network intrusion

prevent intrusion and also stop attacks as they are occurring.

What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?

Worm
Virus
Spyware
Trojan

Trojan

What can be used to create entries in the Security Log whenever a user logs on?

Event Auditing
Event Tracking
Object access auditing
Success Logging

Event Auditing

Antimalware programs can passively monitor your computers activity. What are they called when operating in this Mode?

Virus Swords
Virus Shields
Spyware
Grayware

Virus Shields

How does a computer determine who can or should access it, and once accessed, what that user can do?

Transparency
Encryption
Decryption
Authentication

Authentication

Sally is a member of multiple groups. A file has been granted different permissions to these different groups. What is Sally’s effective permission?

Full Control
Combined permissions of all groups
No permission until explicitly granter
Most restrictive permissions of all groups

Combined permissions of all groups

Together, what are Viruses, Trojans, and Worms called?

Open source software
Spyware
Malware
Encrypted Software

Malware

What has occurred when a user accesses resources in an unauthorized way?

Hardware failure
Unauthorized Access
Virus Attack
Environmental Threat

Unauthorized Access

What term describes the process of cleaning up after a virus infection?

Quarantine
Remnants
Remediation
Declassification

Remediation

To lock down security settings on an individual system on a network, what would you use?

Account Lockout Policy
Group Policy
Local Security Policy
Password Policy

Local Security Policy

What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?

Hacking
Internal Virus
Social Engineering
Inside Attack

Social Engineering

A common _____ attack is where an attacker uses the telephone and convinces a user to give up secure information?

Social Engineering

Most computer attacks are accomplished through what type of attack?

Buffer overflows
Port Scanning
Password cracking
Social engineering

Social engineering

What type of virus attempts to change its signature to prevent detection by antivirus programs?

Stealth
Polymorph
Grayware
Spyware

Polymorph

What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?

System crashing
Dumpster diving
Tailgating
Phishing

Phishing

Port forwarding enables you to open a port in a firewall and direct incoming traffic on that port to a ?

special firewall program
computer on another network
port with a hardware firewall
specific IP address on your LAN

specific IP address on your LAN

What activity involves simply observing someone's screen or keyboard to get information, often passwords?

Phishing
Shoulder surfing
Tailgating
Dumpster diving

Shoulder surfing