2.9. Answers

  1. D. A firewall is designed to stop data from entering your system through the network card. See "Implementing Firewalls".

  2. B. The SSID is the name assigned to the wireless network. Review "Securing wireless".

  3. C. To allow users to read, modify, create, and delete a file, you assign the Modify permission. Check out "Implementing Permissions and Rights".

  4. B. When auditing has been enabled, you view the auditing information by reviewing the security log in Event Viewer. Peruse "Implementing Auditing".

  5. C. A right gives you the privilege to perform an operating system task. Take a look at "Rights".

  6. B. The Full Control permission allows users to modify permissions on a file or folder. Peek at "Permissions".

  7. D. You would assign Bob the Change System Time right. You could put Bob in the Administrators group, but that is not the best answer because you have given him a number of other capabilities at the same time. Look over "Rights".

  8. A. The boot devices can be disabled through the BIOS, which controls whether someone can bypass your operating system by booting from a bootable CD or floppy. Study "Securing Systems through BIOS".

  9. D. Administrators is a built-in group that has full access to the system. Refer to "Creating groups".

  10. A. The Firewall can be enabled through the LAN connection properties. Examine "Implementing Firewalls".

Get CompTIA A+® Certification All-In-One For Dummies®, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.