CET_TARDE - Security Fundamentals 2017 - Part 2

Beschreibung

Security Fundamentals Quizzes
Hawerth Castro
Quiz von Hawerth Castro, aktualisiert more than 1 year ago
Hawerth Castro
Erstellt von Hawerth Castro vor fast 7 Jahre
732
0

Zusammenfassung der Ressource

Frage 1

Frage
A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
Antworten
  • Trojan horse
  • Brute force
  • Ping of death
  • SYN flooding

Frage 2

Frage
What environment would be best suited for a two-firewall network design?
Antworten
  • large corporate environment
  • A home environment with 10 or fewer hosts
  • A home environment that needs VPN access
  • A smaller, less congested business environment

Frage 3

Frage
While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
Antworten
  • Worm
  • Virus
  • Trojan horse
  • Denial of service

Frage 4

Frage
Which two statements are true concerning anti-spam software? (Choose two.)
Antworten
  • Anti-spam software can be loaded on either the end-user PC or the ISP server, but not both.
  • When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
  • Installing anti-spam software should be a low priority on the network.
  • Even with anti-spam software installed, users should be careful when opening e-mail attachments.
  • Virus warning e-mails that are not identified as spam via antispam software should be forwarded to other users immediately.

Frage 5

Frage
What type of advertising is typically annoying and associated with a specific website that is being visited?
Antworten
  • Adware
  • Popups
  • Spyware
  • Tracking cookies

Frage 6

Frage
What part of the security policy states what applications and usages are permitted or denied?
Antworten
  • Dentification and authentication
  • Remote access
  • Acceptable use
  • Incident handling

Frage 7

Frage
To which part of the network does the wireless access point part of a Linksys integrated router connect?
Antworten
  • DMZ
  • External
  • Internal
  • A network other than the wired network

Frage 8

Frage
Identify three techniques used in social engineering. (Choose three.)
Antworten
  • Fishing
  • Vishing
  • Phishing
  • Spamming
  • Pretexting
  • Junk mailing

Frage 9

Frage
What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?
Antworten
  • Brute force
  • Spam
  • Spyware
  • Tracking cookies

Frage 10

Frage
Which acronym refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
Antworten
  • SPI
  • DMZ
  • ISR
  • ISP

Frage 11

Frage
During a pretexting event, how is a target typically contacted?
Antworten
  • By e-mail
  • By phone
  • In person
  • Through another person

Frage 12

Frage
What is a major characteristic of a Worm?
Antworten
  • Malicious software that copies itself into other executable programs
  • Tricks users into running the infected software
  • A set of computer instructions that lies dormant until triggered by a specific event
  • Exploits vulnerabilities with the intent of propagating itself across a network

Frage 13

Frage
What term is used to describe a dedicated hardware device that provides firewall services?
Antworten
  • Server-based
  • Integrated
  • Personal
  • Appliance-based

Frage 14

Frage
What best practice relates to wireless access point security?
Antworten
  • Activation of a popup stopper
  • A change of the default IP address
  • An update in the antivirus software definitions
  • Physically securing the cable between the access point and client

Frage 15

Frage
Which statement is true about port forwarding within a Linksys integrated router?
Antworten
  • Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
  • Only external traffic that is destined for specific internal ports is denied. All other traffic is permitted.
  • Only internal traffic that is destined for specific external ports is permitted. All other traffic is denied.
  • Only internal traffic that is destined for specific external ports is denied. All other traffic is permitted.

Frage 16

Frage
What statement is true about security configuration on a Linksys integrated router?
Antworten
  • A DMZ is not supported.
  • The router is an example of a server-based firewall.
  • The router is an example of an application-based firewall.
  • Internet access can be denied for specific days and times.

Frage 17

Frage
What is one function that is provided by a vulnerability analysis tool?
Antworten
  • It provides various views of possible attack paths.
  • It identifies missing security updates on a computer.
  • It identifies wireless weak points such as rogue access points.
  • It identifies all network devices on the network that do not have a firewall installed.
  • It identifies MAC and IP addresses that have not been authenticated on the network.

Frage 18

Frage
Which statement is true regarding anti-virus software?
Antworten
  • Only e-mail programs need to be protected.
  • Only hard drives can be protected.
  • Only after a virus is known can an anti-virus update be created for it.
  • Only computers with a direct Internet connection need it.

Frage 19

Frage
Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
Antworten
  • Periodically update anti-virus software.
  • Be aware of normal network traffic patterns.
  • Periodically update the host operating system.
  • Activate the firewall on a Linksys integrated router.
  • Configure login permissions on the integrated router.
  • Disable the wireless network when a vulnerability analysis is being performed.

Frage 20

Frage
Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?
Antworten
  • It prevents packets based on the application that makes the request.
  • It allows packets based on approved internal MAC or IP addresses.
  • It requires that packets coming into the router be responses to internal host requests.
  • It translates an internal address or group of addresses into an outside, public address.

Frage 21

Frage
Passwords that contain recognizable words are vulnerable to a:
Antworten
  • replay attack
  • dictionary attack
  • hashing attack
  • Denial of service attack

Frage 22

Frage
A digitally signed e-mail message:
Antworten
  • is encrypted
  • validates the sender
  • is virus-free
  • validates the recipient

Frage 23

Frage
Which password attack uses all possible alpha numeric combinations?
Antworten
  • dictionary attack
  • social engineering
  • brute force attack
  • rainbow table attack

Frage 24

Frage
What is the minimum OS to configure BitLocker?
Antworten
  • Windows Vista Enterprise
  • Windows 7 Enterprise
  • Windows XP Pro
  • Windows 2000

Frage 25

Frage
Account lockout policies are used to prevent which type of security attack?
Antworten
  • passwords being reused immediately
  • users sharing passwords
  • brute force attacks
  • social engineering

Frage 26

Frage
A group of users has access to Folder A and all of its contents. You need to prevent some users from accessing a subfolder inside folder A. What should you do first?
Antworten
  • Change the owner
  • Hide the folder
  • Block inheritance
  • Disable folder sharing

Frage 27

Frage
Which enables you to change the permissions on a folder?
Antworten
  • Auditing
  • Take ownership
  • Extended attributes
  • Modify

Frage 28

Frage
You want to make your computer resistant to online hackers and malicious software. What should you do?
Antworten
  • Turn on Windows Firewall
  • Configure a forward proxy
  • Enable spam filtering
  • Install anti-virus software

Frage 29

Frage
The primary purpose of Network Access Protection (NAP) is to prevent:
Antworten
  • loss of data from client computers on a network
  • users on a network from installing software
  • unauthorized users from accessing a network
  • non-compliant systems from connection to a network

Frage 30

Frage
Many Internet sites that you visit require a username and password. How should you secure these passwords?
Antworten
  • Enable session caching
  • Save them to a text file
  • Save them to an encrypted file
  • Reuse the same password
  • Configure the browser to save passwords

Frage 31

Frage
The purpose of a digital certificate is to verify that a:
Antworten
  • digital document is complete
  • computer is virus-free
  • private key belongs to a sender
  • public key belongs to a sender

Frage 32

Frage
In IE8, InPrivate Browsing feature prevents:
Antworten
  • unauthorized private data input
  • unencrypted communication between the client computer and the server
  • any session data from being stored on the computer
  • user credentials from being sent over the Internet

Frage 33

Frage
Physically securing servers prevents:
Antworten
  • DOS attacks
  • man-in-the-middle attacks
  • compromise os the certificate chain
  • theft

Frage 34

Frage
The Windows Firewall protects computers from:
Antworten
  • email virus
  • phishing scams
  • unencrypted network access
  • unauthorized network connections

Frage 35

Frage
Role separation improve server security by:
Antworten
  • placing servers on separate VLAN’s
  • enforcing principle of least privilege
  • installing applications on separate hard disk
  • physically separating high security servers from others server

Frage 36

Frage
Which one of the following describes spam?
Antworten
  • Gathering information about a person or organisation without their knowledge.
  • Performing an unauthorised, usually malicious, action such as erasing files.
  • Putting unnecessary load on the network by making copies of files.
  • Sending unwanted bulk messages.

Frage 37

Frage
Which one of the following can protect a computer from the risk of unwanted emails?
Antworten
  • Anti-spam software.
  • Anti-virus software.
  • Anti-spyware software.
  • PC diagnostic software.

Frage 38

Frage
Which one of the following could lead to the spread of a malicious program?
Antworten
  • Using only software that has been checked for viruses.
  • Maintaining regularly updated anti-virus software.
  • Opening only virus-checked file attachments from known sources.
  • Using a USB Flash Drive from an unknown source to exchange data.

Frage 39

Frage
Which one of the following describes why it is important to update antivirussoftware regularly?
Antworten
  • To protect your computer from all known viruses.
  • To ensure the software identifies old viruses.
  • To protect your computer from unwanted bulk messages.
  • To prevent the spread of malicious programs on the Internet.

Frage 40

Frage
Which one of the following describes what you should do if you receive a chain letter email?
Antworten
  • Forward the email.
  • Download it onto your system.
  • Delete the email.
  • Send a read receipt.

Frage 41

Frage
Which one of the following describes a computer hacker?
Antworten
  • A skilled programmer who uses authorised access to exploit information available on a computer.
  • A skilled programmer who secretly invades computers without authorisation.
  • A skilled programmer who writes programs to train new employees.
  • A skilled programmer who helps in the installation of new software for an organisation.

Frage 42

Frage
Which one of the following describes why firewalls are used?
Antworten
  • To prevent unauthorised access by incoming transmissions.
  • To prevent destruction of a computer in the event of a fire.
  • To enable easy downloading of data from web sites.
  • To detect and disable viruses already on a computer.

Frage 43

Frage
Which one of the following is MOST likely to be a hoax?
Antworten
  • An email from a friend you have not seen recently.
  • An email with an attachment sent by a colleague using their personal email address.
  • An email asking you to go to a website for a free computer scan.
  • An email advertisement from a local shop you subscribe to.

Frage 44

Frage
Which one of the following is the reason that users should log on with ausername and password?
Antworten
  • To be aware of who is in the building.
  • To check up on the time-keeping of users.
  • To protect computers against unauthorised use.
  • To enable a personalised greeting for each user.

Frage 45

Frage
Which one of the following statements about a password is TRUE?
Antworten
  • It must be changed only if it is compromised.
  • It cannot contain special character symbols.
  • It must be registered with the system administrator.
  • It should be changed regularly.

Frage 46

Frage
Which one of the following should be used to change your password?
Antworten
  • Control Panel.
  • Anti-virus software.
  • Windows Firewall.
  • Internet Explorer.

Frage 47

Frage
Which one of the following shows respect for confidentiality of information?
Antworten
  • Discussing confidential information over the telephone.
  • Disclosing confidential information only to authorised individuals.
  • Uploading confidential information to a shared web site.
  • Emailing confidential information to a colleague.

Frage 48

Frage
Which one of the following would be considered the BEST way to store a PIN number?
Antworten
  • Keep a written note of it with you bank cards.
  • Store it on your computer.
  • Memorise it.
  • Keep a written note of it in your office drawer.

Frage 49

Frage
Which one of the following describes why users should lock their computer when leaving their desk?
Antworten
  • To prevent unauthorised access to data.
  • To prevent a waste of electricity.
  • To prevent data from getting corrupted.
  • To prevent the computer from malfunctioning.

Frage 50

Frage
Which one of the following is an example of phishing?
Antworten
  • An email warning the recipient of a computer virus threat.
  • An email directing the recipient to forward the email to friends.
  • An email directing the recipient to enter personal details on a fake website.
  • An email directing the recipient to download an attachment.

Frage 51

Frage
Which one of the following is unsafe online activity?
Antworten
  • Using a screen name or nick name that cannot identify you.
  • Meeting someone you met online face-to-face in the company of your parents.
  • Keeping your social network profile private.
  • Giving your home address to someone you met in a chat room.

Frage 52

Frage
Which one of the following describes a public network?
Antworten
  • A network where devices outside the network cannot see or communicate directly with computers on the network.
  • A network where devices outside the network can see but cannot communicate directly with computers on the network.
  • A network where devices outside the network can see and communicate directly with computers on the network.
  • A network where devices outside the network cannot see but can communicate directly with computers on the network.

Frage 53

Frage
Which one of the following describes how confidential information should be sent using an unsecured network?
Antworten
  • In an unsigned email.
  • In an encrypted format.
  • In a compressed format.
  • In an attachment.

Frage 54

Frage
Which one of the following statements about wireless networks is TRUE?
Antworten
  • They cannot be intercepted by unknown users.
  • They limit accessibility to other users.
  • They limit visibility to other users.
  • They can be accessible to other users.

Frage 55

Frage
Which one of the following is the recommended action to prevent the risk of access to a network by other users?
Antworten
  • Disconnect the computer from the network.
  • Complain to the System Administrator.
  • Change the default WEP or WPA access key to one that only you know.
  • Adjust the Internet security settings.

Frage 56

Frage
Which one of the following describes Bluetooth?
Antworten
  • Short-range wired protocol for exchanging data.
  • Short-range wireless protocol for exchanging data.
  • Long-range wireless protocol for exchanging data.
  • Long-range wired protocol for exchanging data.

Frage 57

Frage
Which one of the following describes why Bluetooth device settings should be adjusted?
Antworten
  • To increase the range of the device.
  • To improve the quality of reception.
  • To prevent the risk of unauthorised access.
  • To reduce interference from other devices.

Frage 58

Frage
Which one of the following would result in the loss of contact details if it were stolen?
Antworten
  • Printer
  • Mobile Phone.
  • Modem
  • MP3

Frage 59

Frage
Which one of the following should you do to ensure that your USB storage device is kept safe and secure?
Antworten
  • Only use it in private surroundings.
  • Do not access it using a Bluetooth device.
  • Use firewall software.
  • Never leave it unattended.

Frage 60

Frage
Which one of the following departments would usually hold guidelines and procedures for the secure use of IT within an organisation?
Antworten
  • The IT Department.
  • The Marketing Department.
  • The Sales Department.
  • The Finance Department.

Frage 61

Frage
Which one of the following describes why you should follow guidelines and procedures while using IT resources in an organisation?
Antworten
  • To ensure easy access to information on your computer.
  • To ensure the secure use of IT resources.
  • To ensure the IT Department is able to monitor all activity.
  • To ensure the Finance Department is able to monitor the costs of IT resources.

Frage 62

Frage
Which one of the following should you approach if you are unsure of the IT security procedure to follow when uninstalling an application on your computer?
Antworten
  • A technically well-informed team member.
  • A senior colleague in the Finance Department.
  • The Maintenance Department.
  • The Systems Administrator.

Frage 63

Frage
Which one of the following describes how a breach in IT security should be reported?
Antworten
  • Using the telephone.
  • By emailing to the IT Manager.
  • Using any means of communication.
  • Using the method listed in the organisation’s security policy.

Frage 64

Frage
Which one of the following describes how to find out about an organisation’s privacy policy?
Antworten
  • By reading the office newsletter.
  • By reading the policy in the organisation’s policy manual.
  • By speaking to the Finance Department.
  • By speaking to the Sales Department.

Frage 65

Frage
Which one of the following would prevent the theft of a laptop?
Antworten
  • Anti-virus software.
  • Spyware
  • A security cable.
  • A webcam

Frage 66

Frage
Bridging is a process of sending packets from source to destination on OSI layer 3. Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
Antworten
  • Routing
  • Switching
  • Repeating
  • No change is needed.

Frage 67

Frage
Windows Firewall is a built-in. host-based, stateless firewall. Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
Antworten
  • Stateful
  • Network layer
  • Packet filter
  • No change is needed

Frage 68

Frage
The primary purpose of Network Access Protection (NAP) is to prevent:
Antworten
  • Loss of data from client computers on a network.
  • Non-compliant systems from connecting to a network.
  • Users on a network from installing software.
  • Unauthorized users from accessing a network.

Frage 69

Frage
Your company maintains a Web server that is accessible to the public. It should be placed in a/an:
Antworten
  • primary DNS zone.
  • enterprise domain.
  • perimeter network.
  • Virtual Private Network (VPN).

Frage 70

Frage
A network sniffer is software or hardware that:
Antworten
  • captures and analyzes network communication.
  • records user activity and transmits it to the server
  • protects workstations from intrusions.
  • catalogs network data to create a secure index

Frage 71

Frage
Which enables an employee to connect securely to a corporate network by using the Internet?
Antworten
  • Virtual Private Networking (VPN)
  • Remote Desktop Protocol (RDP)
  • Network Address Translation (NAT)
  • Network Access Protection (NAP)

Frage 72

Frage
You are trying to establish communications between a client computer and server. The server is not responding. You confirm that both the client and the server have network connectivity. Which should you check next?
Antworten
  • Data Execution Prevention
  • Microsoft Update
  • Active Directory Domains and Trusts
  • Windows Firewall

Frage 73

Frage
You have an application that communicates by using plain text. You want to secure communications between the application and a server at the network layer. What should you implement?
Antworten
  • IPSec
  • SFTP
  • TLS
  • SSH

Frage 74

Frage
Which technology enables you to filter communications between a program and the Internet?
Antworten
  • Antivirus software
  • BitLocker To Go
  • RADIUS Server
  • Software firewall

Frage 75

Frage
The primary purpose of Network Access Protection (NAP) is to prevent:
Antworten
  • loss of data from client computers on a network.
  • non-compliant systems from connecting to a network.
  • unauthorized users from accessing a network.
  • users on a network from installing software.

Frage 76

Frage
A malicious user who intercepts and modifies communications is known as a:
Antworten
  • red hat hacker
  • man-in-the-middle
  • network sniffer.
  • white hate hacker.

Frage 77

Frage
Which three file system objects can you specify the NTFS permissions for? (Choose three.)
Antworten
  • Parents
  • Folders
  • Extensions
  • Files
  • Subfolders

Frage 78

Frage
You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen. What should you implement?
Antworten
  • Advanced Encryption Standard (AES)
  • Folder level permissions
  • File-level permissions
  • Distributed File System (DFS)
  • BitLocker

Frage 79

Frage
Basic security questions used to reset a password are susceptible to:
Antworten
  • social engineering.
  • hashing
  • network sniffing.
  • Trojan horses.

Frage 80

Frage
Which displays a user’s level of access to a particular file or folder on the server?
Antworten
  • The Resultant Set of Policy
  • The object's Effective Permission
  • The client computer's registry
  • The object's Advanced Attributes

Frage 81

Frage
When conducting a security audit, the first step is to:
Antworten
  • set up a virus quarantine area.
  • inventory the company's technology assets.
  • set up the system logs to audit security events.
  • install auditing software on your servers.

Frage 82

Frage
Biometrics are used to:
Antworten
  • study hacking behavior.
  • perform security audits.
  • authenticate users.
  • measure the attack surface.

Frage 83

Frage
A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a sub-folder inside Folder A.
Antworten
  • Disable folder sharing
  • Change the owner
  • Block inheritance
  • Hide the folder

Frage 84

Frage
How can you confirm whether a computer on your network is the target of a brute force attack?
Antworten
  • Run the show all access command
  • Use antivirus software to scan the computer
  • Check your Windows folder for unsigned files
  • Check the security log for failed authentication attempts

Frage 85

Frage
The default password length for a Windows Server domain controller is:
Antworten
  • 0
  • 5
  • 7
  • 14

Frage 86

Frage
Which is the minimum requirements to create BitLocker To Go media on a client computer?
Antworten
  • Windows Vista Enterprise Edition
  • Windows 2000 Professional Service Pack 4
  • Windows 7 Enterprise Edition
  • Windows XP Professional Service Pack 3

Frage 87

Frage
Software designed to infiltrate or damage a computer without the user’s consent is referred to as:
Antworten
  • Embedded
  • Freeware
  • Malware
  • Unsigned

Frage 88

Frage
You need to be able to track file access. Which type of auditing should you implement?
Antworten
  • Object access
  • Process tracking
  • Directory services
  • Logon events

Frage 89

Frage
A solution designed to detect unauthorized user activities, attacks, and network compromises that can also take action to prevent a breach from occurring.
Antworten
  • intrusion prevention systems (IPS)
  • intrusion detection systems (IDS)
  • DNS Security Extensions (DNSsec)
  • Unified Threat Management (UTM)

Frage 90

Frage
A conceptual model, created by the International Organization for Standardization (ISO) to describe a network architecture that allows the passage of data between computer systems. Although never fully utilized as model for a protocol, the OSI model is nonetheless the standard for discussing how networking works.
Antworten
  • Secure Content Management (SCM)
  • DMZ (demilitarized zone)
  • stateful inspection
  • Open Systems Interconnect (OSI)

Frage 91

Frage
A system that is designed to protect a computer or a computer network from network-based attacks. A firewall does this by filtering the data packets that are traversing the network.
Antworten
  • Firewall
  • host firewall
  • Honeypot
  • Honey net

Frage 92

Frage
An attack against the cached information on your DNS server.
Antworten
  • Honeypot
  • DNS spoofing
  • DNS poisoning
  • Spoofing

Frage 93

Frage
The consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes.
Antworten
  • Risk
  • Availability
  • Threat
  • Integrity

Frage 94

Frage
Answer Area
Antworten
  • Yes
  • No
  • Yes
  • No
  • Yes
  • No

Frage 95

Frage
Answer Area
Antworten
  • Yes
  • No
  • Yes
  • No
  • Yes
  • No

Frage 96

Frage
You are preparing a local audit policy for your workstation. No auditing is enabled. The settings of your policy are shown in the following image:
Antworten
  • Audit Account logon events
  • Audit logon events
  • Audit Object access
  • Audit system events
  • Audit process traking
  • Audit logon events

Frage 97

Frage
To keep third-party content providers from tracking your movements on the web, enable InPrivate Browsing. Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
Antworten
  • InPrivate Filtering
  • SmartScreen Filter
  • Compatibility Mode
  • No change is needed

Frage 98

Frage
Humongous Insurance needs to set up a domain controller in a branch office. Unfortunately, the server cannot be sufficiently secured from access by employees in that office, so the company is installing a Primary Domain Controller. Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
Antworten
  • Read-Only Domain Controller
  • Backup Domain Controller
  • Active Directory Server
  • No change is needed.

Frage 99

Frage
Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network. Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
Antworten
  • Minimum password age
  • Maximum password duration
  • Password complexity
  • No change is needed.

Frage 100

Frage
Which attack listens to network traffic of a computer resource?
Antworten
  • Resource gathering
  • Denial of service
  • ARP poisoning
  • Eavesdropping
  • Logic bomb

Frage 101

Frage
To implement WPA2 Enterprise, you would need a/an:
Antworten
  • RADIUS server
  • SSL server
  • WEP server
  • VPN server

Frage 102

Frage
The company that you work for wants to set up a secure network, but they do not have any servers. Which three security methods require the use of a server? (Choose three.)
Antworten
  • 802.1x
  • WPA2 Personal
  • WPA2 Enterprise
  • RADIUS
  • 802.11ac

Frage 103

Frage
You suspect a user’s computer is infected by a virus. What should you do first?
Antworten
  • Restart the computer in safe mode
  • Replace the computer’s hard disk drive
  • Disconnect the computer from the network
  • Install antivirus software on the computer

Frage 104

Frage
Malware is any kind of unwanted software that is installed without your consent. Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
Antworten
  • Viruses are
  • Worms are
  • Trojans are
  • No change is needed.

Frage 105

Frage
You need to be able to track file access. Which type of auditing should you implement?
Antworten
  • Object access
  • Directory services
  • Logon events
  • Process tracking

Frage 106

Frage
Which networking protocol provides centralized authentication, authorization and accounting?
Antworten
  • SMTP
  • RADIUS
  • HTTPS
  • OpenID

Frage 107

Frage
A Virtual Private Network (VPN) is a/an:
Antworten
  • Tunnel that prevents information that passes through it from being modified or stolen
  • Perimeter network that contains secure virtual servers
  • Virtual communication method that stores data transmitted in private environment
  • Intrusion Prevention System that filters unauthorized communications in the enterprise network

Frage 108

Frage
Kerberos prevents (Choose two):
Antworten
  • File corruption
  • Spyware distribution
  • Replay attacks
  • Eavesdropping
  • Denial of Service attacks

Frage 109

Frage
You are network administrator. All computers run the Microsoft Internet Explorer browser. You need to prevent web cookies from being saved. What you should you enforce?
Antworten
  • SmartScreen Filter (ajuda a identificar sites de phishing e de software maligno)
  • InPrivate Browsing
  • Antivirus protection
  • Cross-Site Scripting Filter (ficheiros HTML)

Frage 110

Frage
What are three ways you can reduce the number of opportunities that attackers have to exploit potential weaknesses or vulnerabilities? (Choose three)
Antworten
  • Employ content filtering for web browsers
  • Restrict access to system services
  • Employ layered defenses
  • Apply the principle of least privilege
  • Elevate all accounts to administrator accounts

Frage 111

Frage
8. For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. -A wireless MAC filter list allows only specified devices to receive packets sent from an access point [blank_start]NO[blank_end] -A wireless MAC filter list can be used to either allow or deny access to the wireless network [blank_start]YES[blank_end] -A wireless MAC filter list automatically applies encryption to a connection [blank_start]NO[blank_end]
Antworten
  • YES
  • NO
  • YES
  • NO
  • YES
  • NO

Frage 112

Frage
Encrypting a hard disk is an example of ensuring:
Antworten
  • Least privilege
  • Confidentiality
  • Integrity
  • Security by default

Frage 113

Frage
Installing uninterruptible power sources to your servers is an example of ensuring:
Antworten
  • Integrity
  • Availability
  • Accessibility
  • A backup strategy

Frage 114

Frage
Media Access Control (MAC) filtering enables you to:
Antworten
  • Set access permission to a shared folder
  • Limit access to a network based on the client computer’s network adapter
  • Prevent communications between specific IP addresses
  • Restrict communications to specific website

Frage 115

Frage
Settings a database to run on a cluster of servers is an example of applying:
Antworten
  • Accessibility
  • Confidentiality
  • Availability
  • Integrity

Frage 116

Frage
You have a new computer and want to restrict other people from replacing the operating system. Which action prevents a user from installing an alternate operating system by using physical media if the user has physical access to the computer.
Antworten
  • Password protecting the computer BIOS
  • Removing the user from the administrators group
  • Installing drive-level encryption
  • Disabling removable devices and drives

Frage 117

Frage
You need to give a standard user permission to run a program as an administrator. How should you set up the program shortcut to accomplish this?
Antworten
  • In a different Compatibility Mode
  • By using a smart card
  • In a separate memory space
  • By utilizing RunAs

Frage 118

Frage
Your anti-spam program is blocking emails from a particular sender. your company needs to receive emails from this sender. What should you do?
Antworten
  • Add the email address to the whitelist
  • Accept RSS feeds from their domain
  • List the sender’s email address in DNS
  • Reconfigure the SMS Gateway

Frage 119

Frage
You want to prevent external users from acquiring information about your network. You should implement a:
Antworten
  • Proxy server
  • Firewall
  • Layer-3 switch
  • Router

Frage 120

Frage
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. Securing network communication through IPSec packet signing ensures data integrity while in transit [blank_start]YES[blank_end] IPSec packet ensures that the data is invulnerable to eavesdropping attacks [blank_start]YES[blank_end] Most websites use IPSec to secure communications between their web servers and client web browsers. [blank_start]NO[blank_end]
Antworten
  • YES
  • NO
  • YES
  • NO
  • YES
  • NO

Frage 121

Frage
You have an application that communicates by using plain text. You want to secure communications between the application and server at the network layer. What should you implement?
Antworten
  • SFTP
  • SSH
  • IPSec
  • TLS

Frage 122

Frage
The process of creating a barrier between domain members and non-domain members by using IPSec policies is referred to as:
Antworten
  • Server isolation
  • Domain isolation
  • Server filtering
  • Domain filtering

Frage 123

Frage
An authentication protocol used by Windows stand-alone systems is:
Antworten
  • SMB
  • NTLM
  • NetBIOS
  • EAP
  • Kerberos

Frage 124

Frage
An authentication protocol widely used in 802.11 environments is:
Antworten
  • SMB
  • NTLM
  • NetBIOS
  • EAP
  • Kerberos

Frage 125

Frage
A strong authentication protocol preferred by Windows Server 2012 R2 is:
Antworten
  • SMB
  • NTLM
  • NetBIOS
  • EAP
  • Kerberos
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CET_TARDE - Security Fundamentals 2017 - Part 1
Hawerth Castro
CET_TARDE - Security Fundamentals 2017 - Preparing for the certified
Hawerth Castro
Introdução ao Microsoft Word
Roberto Becker
CET_TARDE - Security Fundamentals 2017 - Part 1
Filipe Lopes
SALESFORCE ADM-201 Certification Exam 1
Hawerth Castro
SALESFORCE ADM-201 Certification Exam 2
Hawerth Castro
Microsoft Word 2010 - Aulas 05 e 06
Jaqueline Oliveira
SALESFORCE ADM-201 Certification Exam 7
Hawerth Castro
CET_TARDE - MTA HTML5 Application Development Fundamentals 2
Hawerth Castro
SALESFORCE DEV-401 Certification Evaluation 1
Hawerth Castro
Microsoft Word 2010 Aula 01 e 02
Jaqueline Oliveira