0% found this document useful (0 votes)
189 views

Module 4 Unit 3, 4, & 5 Review Questions

1. The document provides review questions and answers for Modules 4, Units 3, 4, and 5 which cover topics related to IT security, networking, and mobile devices. 2. Questions cover a range of topics including email security settings, types of malware, browser plug-ins, website cookies, clearing browser caches in public places, firewall configurations, file sharing, and mobile device features like touchscreen gestures and airplane mode. 3. Answers explain secure socket layer/transport layer security (SSL/TLS) for email, trojan horses, plug-ins for custom media formats, cookies for website tracking, clearing browser caches in internet cafes, firewall configurations using IP addresses and ports, and features of smartphones

Uploaded by

Alexander Baxter
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
189 views

Module 4 Unit 3, 4, & 5 Review Questions

1. The document provides review questions and answers for Modules 4, Units 3, 4, and 5 which cover topics related to IT security, networking, and mobile devices. 2. Questions cover a range of topics including email security settings, types of malware, browser plug-ins, website cookies, clearing browser caches in public places, firewall configurations, file sharing, and mobile device features like touchscreen gestures and airplane mode. 3. Answers explain secure socket layer/transport layer security (SSL/TLS) for email, trojan horses, plug-ins for custom media formats, cookies for website tracking, clearing browser caches in internet cafes, firewall configurations using IP addresses and ports, and features of smartphones

Uploaded by

Alexander Baxter
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

10/03/2023 Alexander Baxter

Module 4 Units 3, 4, & 5 Review Questions


Module 4 Unit 3
1. If you use an open network, what email configuration setting should you ensure is enabled?
You should ensure that secure socket layer/transport layer security (SSL/TLS) is enabled, as this
will encrypt the connection between your client and the mail server you are using and therefore protect
your password and other data from being intercepted.

2. You have installed a screensaver application. Later, after updating your anti-virus software, a
malicious program is found. This appears to have infected your system at the same time as the
screensaver was installed. What class of malware is this?

This type of malware is classed as a trojan horse. A trojan horse comes attached with a seeming
legitimate application that conceals the malicious functions of the malware being installed on your
computer, making it difficult to detect when installing.

3. You want to use a website that hosts training modules in a custom media format. What type of add-
on would you need to install to play this media?

In this scenario, you would need to install a plug-in add-on. Plug-ins allow you to play a form of
content or media embedded within a given webpage, and some examples would be Adobe Flash or
Microsoft Silverlight.

4. What type of file might a website use to track whether you have visited it before?

In order to track whether you have visited a given website before, the website may store your
session information in a plain text file known as a cookie. Cookies track what you type, what settings you
use, and so on, in order to personalize the website for you and display targeted advertising.

5. True or false? Browser pop-up windows are definite symptoms of virus infection.

This statement is false, as most of the time pop-ups are designed and implemented to be helpful
to the user, one example being displaying additional information to the user without them having to
navigate to another webpage. It is mostly the aggressive use of pop-up windows that is associated with
malware, when most every action you take results in a pop-up being displayed.

6. You are using a computer in an Internet cafe. What should you do at the end of the session?

Browsers can be set to store typed information, passwords, and browsing history in what is
known as the browser’s cache. Whenever you are browsing on a public Wi-Fi, such as one in an internet
cafe, you should always clear this cache before logging off through either the browser’s settings or
configuration page.
7. What identifies a website as using the secure HTTPS protocol with a valid certificate?

If a website is using the secure HTTPS protocol, the website address will begin with “https://”
protocol. If the certificate for this protocol is trusted and valid, there will be a padlock icon to the left of
the website address. This padlock icon can then be clicked to view information regarding the certificate
and the guarantee it is safe through the Certificate Authority.

8. You want to restrict access to a computer on your network to a single Internet host running a
particular application. What two things do you need to configure in your firewall's access control list?

To restrict a computer’s access to a single internet host, you will need to configure your firewall
using your host IP address and the port number of the application or browser you are running.

Module 4 Unit 4
1. True or false? A hard disk connected to a computer via a USB port could be described as
"Direct Attached Storage."
This statement is true, as if a computer shares an attached drive, or a folder within that
drive, the hard disk can be referred to as direct attached storage.

2. What type of connection would a NAS device use?


A network attached storage (NAS) device is a computer data storage server which can be
connected by either a wired ethernet connection or a Wi-Fi connection.

3. Which admin tool or screen would you use to configure a Windows computer to join a
domain?
You can either use the system applet located within the control panel, or simply via the
settings app.

4. True or false? Any version or edition of Windows can be used to share files with other
users.
This statement is true. As long as the firewall or network settings are configured to allow
it, any and all files or folders on a Windows device can be shared with other computers.
5. How could you access a network folder called DATA on a network server called TOWER1
using the Explorer address bar?
To do this, you must enter the shared folder’s universal naming convention (UNC) into the
explorer address bar. The UNC consists of two parts, the server name and the shared folder name. The
server name is preceded by a double slash, and the folder name comes after being separated by a single
slash. Therefore, the UNC for this question would be “\\TOWER1\DATA”.

6. What is a mapped drive?

A mapped drive is a shortcut created on one computer that maps to a shared folder which exists
on another computer. They can be created simply by right clicking on the shared drive and selecting
“Map network drive…”.

7. What protocol would be used to provide encrypted file downloads from a web server?

You will need to use HTTP/HTTPS and SSL/TLS. HTTP/HTTPS allows for a web server to use
hyperlinks, which can direct to any type of file, meaning a web server can use them to host file
downloading. SSL/TLS will allow the encryption of communication between a user and a server, meaning
you will be able to download an encrypted file from the web server.

8. You have made a backup of system data using a removable hard disk. What should you do next?

After making the backup, you should move the hard disk to a secure location away from the
computer in an off-site location. This is because if the hard disk is stored on-site and there were to be a
theft, flood, fire, etc., the backup can be stolen or destroyed along with the computer therefore making
it useless.

Module 4 Unit 5
1. What type of gesture is typically used for zooming on a touchscreen?
The gestures used for zooming on a touchscreen are known as pinch and stretch. By bringing two
of your fingers together by sliding them along the touchscreen (pinching) you can zoom in. By spreading
two of your fingers away from one another along the touchscreen (stretching) you can zoom out.

2. What is the purpose of an accelerometer, as fitted in a mobile device?

When fitted in a mobile device, an accelerometer is used to detect when a device is moved from
portrait to landscape and change the screen orientation accordingly.
3. What feature allows data to be removed from a device if is lost or stolen?

If a mobile device has been lost or stolen and the user does not wish for their data to be
compromised, they can perform what is known as a remote wipe or “kill switch”. The remote wipe
allows for the mobile device to be reset to its factory default state and can be triggered via too many
incorrect passwords or directly by enterprise management software.

4. True or false? A smartphone cannot join a Wi-Fi network if the SSID is not being broadcast.

This statement is false, as if you know the network name that you are trying to connect to, you
can use it to connect to the network manually.

5. What is "airplane mode?"

Airplane mode is a quick and easy way to disable all of the wireless features of a phone,
including cellular data, Wi-Fi, GPS, and Bluetooth.

You might also like