CompTIA A+ 220-1001 & 220-1002 A+ 1002: CH27 Review
This flashcard set covers environmental and safety standards from Chapter 27 of the CompTIA A+ 220-1002 exam, focusing on ideal humidity levels for computer equipment to prevent damage and maintain optimal performance.
What is the correct humidity range for Computer Equipment?
0 - 20%
30 - 40%
60 - 80%
10 - 20%
30 - 40%
Key Terms
What is the correct humidity range for Computer Equipment?
0 - 20%
30 - 40%
60 - 80%
10 - 20%
30 - 40%
Not all _____ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information?
unauthorized
Microsoft’s Encryption method of choice for WAN is _______?
Kerberos
MS-CHAP
IPsec
CHAP
IPsec
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?
Virus
Spyware
Trojan
Worm
Virus
Both wired and wireless networks can use ______ or port security to enable you to blacklist or whitelist devices?
port filtering
MAC filtering
software authentication
two-factor authentication
MAC filtering
Physical Security, Authentication, Users and Groups, and Security Policies are all aspects of _______?
environmental controls
access control
database management
network locks
access control
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
What is the correct humidity range for Computer Equipment? 0 - 20% | 30 - 40% |
Not all _____ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information? | unauthorized |
Microsoft’s Encryption method of choice for WAN is _______? Kerberos | IPsec |
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program? Virus | Virus |
Both wired and wireless networks can use ______ or port security to enable you to blacklist or whitelist devices? port filtering | MAC filtering |
Physical Security, Authentication, Users and Groups, and Security Policies are all aspects of _______? environmental controls | access control |
A user has a credit card-sized card used to prove her identity with a PIN. What is this card called? Biometric Card | Smart Card |
A hardware firewall ______? uses hardware to recover from effects of viruses | inspects incoming packets individually |
Most Websites today use _______ to encrypt connections? DLP | TLS |
Which current authentication method is typically used over a LAN? CHAP | Kerberos |
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems? Trojan | Worm |
An intrusion prevention system will ______? prevent intrusion and also stop attacks as they are occurring | prevent intrusion and also stop attacks as they are occurring. |
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)? Worm | Trojan |
What can be used to create entries in the Security Log whenever a user logs on? Event Auditing | Event Auditing |
Antimalware programs can passively monitor your computers activity. What are they called when operating in this Mode? Virus Swords | Virus Shields |
How does a computer determine who can or should access it, and once accessed, what that user can do? Transparency | Authentication |
Sally is a member of multiple groups. A file has been granted different permissions to these different groups. What is Sally’s effective permission? Full Control | Combined permissions of all groups |
Together, what are Viruses, Trojans, and Worms called? Open source software | Malware |
What has occurred when a user accesses resources in an unauthorized way? Hardware failure | Unauthorized Access |
What term describes the process of cleaning up after a virus infection? Quarantine | Remediation |
To lock down security settings on an individual system on a network, what would you use? Account Lockout Policy | Local Security Policy |
What process involves using or manipulating people inside the networking environment to gain access to that network from the outside? Hacking | Social Engineering |
A common _____ attack is where an attacker uses the telephone and convinces a user to give up secure information? | Social Engineering |
Most computer attacks are accomplished through what type of attack? Buffer overflows | Social engineering |
What type of virus attempts to change its signature to prevent detection by antivirus programs? Stealth | Polymorph |
What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically? System crashing | Phishing |
Port forwarding enables you to open a port in a firewall and direct incoming traffic on that port to a ? special firewall program | specific IP address on your LAN |
What activity involves simply observing someone's screen or keyboard to get information, often passwords? Phishing | Shoulder surfing |