comp 2 Flashcards

admin

Students also studied

Study guides

Practice questions for this set

A malicious browser push notification tricked the student into downloading malware.

low battery charge can cause several different problems to lớn occur on a mobile device. Which of the following issues could stem from a low battery? (Select all that apply.)

While researching and writing a paper on their trang chính computer, a student notices an alert in the notification area that Windows Defender has expired and needs to lớn be updated. The student is annoyed by the interruption but clicks on the alert and follows the update instructions. Later, the student told their parents that Defender expired, and they installed the update. The student's parents are panic-stricken. Determine the best reason for the parents' reaction from the information provided.

user receives an unsolicited Hotline from a Microsoft tư vấn technician during a normal workday. The technician says the antivirus software on the user's computer alerted Microsoft of a new malware infection. The technician needs to lớn remote into the user's computer to lớn fix the problem. What is the technician trying to lớn do?

security administrator for Linux systems in their demilitarized zone wants to lớn ensure only some administrators can perform certain commands. Which of the following is best used to lớn lock down certain commands?

Employees are expected to lớn stay updated on skills and knowledge to lớn cope with changing threat types. Which of the following covers this?

Security-awareness training

attacker uses a technique against a wireless network that allows them to lớn flood access points with too many packets. What is this called?

Linux administrator sets up a development environment where they can install and test new packages. Which of the following commands will help the administrator accomplish this? (Select all that apply.)

Microsoft provides a repository of information about threats that Windows Defender discovers. What is the name of the repository?

To ensure the authenticity and authorization of a mobile ứng dụng, a service provider issues a certificate to lớn valid developers. Developers can use this certificate to lớn sign their ứng dụng, and to lớn establish trust. Which of the following attributes of an ứng dụng would likely disqualify as trustworthy?

Duplicates the function of core OS apps.

technician suspects a computer system is infected with malware. Which of the following activities is the correct next step?

What method uses the process of immersing the device into a high-intensity magnetic field that leaves the object magnetically impartial?

curious user looks through their local logs and sees errors in region-coding copy-protection mechanisms. What type of device is generating these logs?

manager for a Linux server team recently purchased new software which will help to lớn streamline operations, but they are worried that in IT, there is a high turnover of personnel. The manager wants to lớn ensure they can obtain updates, monitor and fix security issues, and are provided technical assistance. What impact is the manager trying to lớn mitigate?

user finds that their iPhone 5 starts to lớn lập cập slowly, and a reboot does not solve the slow performance. Which of the following issues could be causing the problem? (Select all that apply.)

Too many apps open
OS update
Low battery charge

While researching and writing a paper on their trang chính computer, a student notices an alert in the notification area that Windows Defender has expired and needs to lớn be updated. The student is annoyed by the interruption but clicks on the alert and follows the update instructions. Later, the student told their parents that Defender expired, and they installed the update. The student's parents are panic-stricken. Determine the best reason for the parents' reaction from the information provided.

A malicious browser push notification tricked the student into downloading malware.

security administrator for Linux systems in their demilitarized zone wants to lớn ensure only some administrators can perform certain commands. Which of the following is best used to lớn lock down certain commands?

If an individual is creating an tài khoản and unable to lớn think of a strong key code word, the browser can suggest strong keycodes to lớn use. What is this called?

technician is cleaning a computer and notices dust forming over the người hâm mộ blades and ventilation slots. What can the technician use to lớn perform dust cleanup? (Select all that apply.)

Compressed air blaster
Natural bristle brush
PC vacuum cleaner

technician uses a method where each server is configured with a public/private encryption key pair and identified by a host key fingerprint. What is this method?