Which of the following is the method used to gain access to data, systems, or networks, primarily through misrepresentation and relies on the trusting nature of the person being attacked?
Non-Repudiation
Attack Surface
IPAM
Social Engineering
True or False: Biometrics are a good way to secure certain areas of a building.
Which of the following are very common social engineering tactics?
Email
Port Sniffing
Watching someone type a password
Calling and asking a user for their credentials
Impersonation
True or False: A laptop cannot be secured to a desk or workspace in a convenient manner.
What type of Windows Server is responsible for storing, accessing and managing an Active Directory implementation?
DHCP
Print Server
File Server
Workstation
Domain Controller
Which of the following is the process of tracking users who have logged in and what those user have accessed or tried to access?
Auditing
Active Directory
Encryption
RADIUS
What is Microsoft’s technology for centrally tracking and managing users and information about them?
Point-to-Point Tunneling Protocol
NFS
NDS
True or False: PGP is the encryption technology used to secure websites on the internet.
What is the process of identifying an individual, usually based on a username and password?
Authentication
Authorization
Which of the following is a valid network troubleshooting tool that can be used by someone trying to steal data or logon credentials from a network?
nslookup
DNS
Wire Tester
Network Sniffer
Which of the following is a crude type of attack that attempts to compromise a password by trying all possible combinations of permitted character types?
Dictionary Attack
Man-in-the-Middle
Brute Force Attac
Denial-of-Service (DoS)
Microsoft provides which of the following as a password policy option to prevent password attacks from being effective?
SSL
Physical Security
Smart Cards
Account Lockout
True or False: Password attacks are a very common way for attackers to attempt to compromise a computer or network.
The shortest possible amount of time that a user is required to use the same password per a password policy is known as?
Password History
Minimum Password Age
Complex Password
This can be used to serve as a buffer between to networks and provide isolation to certain network services:
Firewall
Server
Perimeter Network
Router
Organizational Unit
True or False: Firewalls operate at layer 6 of the OSI model.
True or False: A honeypot is an effective deterrent to hackers successfully compromising your network.
Which of the following are protocols commonly used in VPN implementations? (Choose four)
Secure Sockets Layer (SSL)
Point-to-Point Tunneling Protocol (PPTP)
Secure Socket Tunneling Protocol (SSTP)
Hypertext Transfer Protocol (HTTP)
IPSec
Which of the following is a method used to analyze the health of computers attempting to connect to the network and allow or deny access to the network based on the results?
VPN
BitLocker
Network Access Protection (NAP)
IMAP
True or False: The windows firewall can be centrally managed using group policy.
When a user receives an email or sees a pop-up windows warning them of a virus infection and either asks them to forward the warning on or provides a link to download software to remove the threat it is know as a:
Adware
Rootkit
Virus Hoax
Trojan Horse
Social Engineering Attack
Which of the following features of Internet Explorer can assist an administrator or user in securing the browsing experience?
Pop-Up Blocker
Start Page
Cookies and Privacy Settings
Content Zones
Temporary Internet Files
True or False: Malware is software designed to infiltrate or affect a computer system without the owner’s informed consent.
True or False: Microsoft provides an anti-malware/anti-virus package for windows