CET_TARDE - Security Fundamentals 2017 - Preparing for the certified

Beschreibung

Security Fundamentals Quizzes - Preparing for the certificate
Hawerth Castro
Quiz von Hawerth Castro, aktualisiert more than 1 year ago
Hawerth Castro
Erstellt von Hawerth Castro vor fast 7 Jahre
365
0

Zusammenfassung der Ressource

Frage 1

Frage
Which of the following is the method used to gain access to data, systems, or networks, primarily through misrepresentation and relies on the trusting nature of the person being attacked?
Antworten
  • Non-Repudiation
  • Attack Surface
  • IPAM
  • Social Engineering

Frage 2

Frage
True or False: Biometrics are a good way to secure certain areas of a building.
Antworten
  • True
  • False

Frage 3

Frage
Which of the following are very common social engineering tactics?
Antworten
  • Email
  • Port Sniffing
  • Watching someone type a password
  • Calling and asking a user for their credentials
  • Impersonation

Frage 4

Frage
True or False: A laptop cannot be secured to a desk or workspace in a convenient manner.
Antworten
  • True
  • False

Frage 5

Frage
What type of Windows Server is responsible for storing, accessing and managing an Active Directory implementation?
Antworten
  • DHCP
  • Print Server
  • File Server
  • Workstation
  • Domain Controller

Frage 6

Frage
Which of the following is the process of tracking users who have logged in and what those user have accessed or tried to access?
Antworten
  • Auditing
  • Active Directory
  • Encryption
  • Non-Repudiation
  • RADIUS

Frage 7

Frage
What is Microsoft’s technology for centrally tracking and managing users and information about them?
Antworten
  • Active Directory
  • RADIUS
  • Point-to-Point Tunneling Protocol
  • NFS
  • NDS

Frage 8

Frage
True or False: PGP is the encryption technology used to secure websites on the internet.
Antworten
  • True
  • False

Frage 9

Frage
What is the process of identifying an individual, usually based on a username and password?
Antworten
  • Auditing
  • Authentication
  • Authorization
  • Encryption

Frage 10

Frage
Which of the following is a valid network troubleshooting tool that can be used by someone trying to steal data or logon credentials from a network?
Antworten
  • nslookup
  • DNS
  • Wire Tester
  • Network Sniffer

Frage 11

Frage
Which of the following is a crude type of attack that attempts to compromise a password by trying all possible combinations of permitted character types?
Antworten
  • Social Engineering
  • Dictionary Attack
  • Man-in-the-Middle
  • Brute Force Attac
  • Denial-of-Service (DoS)

Frage 12

Frage
Microsoft provides which of the following as a password policy option to prevent password attacks from being effective?
Antworten
  • SSL
  • Physical Security
  • DHCP
  • Smart Cards
  • Account Lockout

Frage 13

Frage
True or False: Password attacks are a very common way for attackers to attempt to compromise a computer or network.
Antworten
  • True
  • False

Frage 14

Frage
The shortest possible amount of time that a user is required to use the same password per a password policy is known as?
Antworten
  • Non-Repudiation
  • Encryption
  • Password History
  • Minimum Password Age
  • Complex Password

Frage 15

Frage
This can be used to serve as a buffer between to networks and provide isolation to certain network services:
Antworten
  • Firewall
  • Server
  • Perimeter Network
  • Router
  • Organizational Unit

Frage 16

Frage
True or False: Firewalls operate at layer 6 of the OSI model.
Antworten
  • True
  • False

Frage 17

Frage
True or False: A honeypot is an effective deterrent to hackers successfully compromising your network.
Antworten
  • True
  • False

Frage 18

Frage
Which of the following are protocols commonly used in VPN implementations? (Choose four)
Antworten
  • Secure Sockets Layer (SSL)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Secure Socket Tunneling Protocol (SSTP)
  • Hypertext Transfer Protocol (HTTP)
  • IPSec

Frage 19

Frage
Which of the following is a method used to analyze the health of computers attempting to connect to the network and allow or deny access to the network based on the results?
Antworten
  • VPN
  • BitLocker
  • DNS
  • Network Access Protection (NAP)
  • IMAP

Frage 20

Frage
True or False: The windows firewall can be centrally managed using group policy.
Antworten
  • True
  • False

Frage 21

Frage
When a user receives an email or sees a pop-up windows warning them of a virus infection and either asks them to forward the warning on or provides a link to download software to remove the threat it is know as a:
Antworten
  • Adware
  • Rootkit
  • Virus Hoax
  • Trojan Horse
  • Social Engineering Attack

Frage 22

Frage
Which of the following features of Internet Explorer can assist an administrator or user in securing the browsing experience?
Antworten
  • Pop-Up Blocker
  • Start Page
  • Cookies and Privacy Settings
  • Content Zones
  • Temporary Internet Files

Frage 23

Frage
True or False: Malware is software designed to infiltrate or affect a computer system without the owner’s informed consent.
Antworten
  • True
  • False

Frage 24

Frage
True or False: Microsoft provides an anti-malware/anti-virus package for windows
Antworten
  • True
  • False
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

QUESTIONÁRIO DE INFORMÁTICA: SISTEMAS OPERACIONAIS
anapaulabrasilam
WINDOWS PHONE - IOS
Ricardo Augusto5798
CET_TARDE - Security Fundamentals 2017 - Part 2
Hawerth Castro
Windows 10
Ricardo Berti
CET_TARDE - Security Fundamentals 2017 - Part 1
Hawerth Castro
CET_TARDE - MTA Database - STANDARDS
Hawerth Castro
CET_TARDE - Security Fundamentals 2017 - Part 3
Hawerth Castro
Introdução ao Microsoft Word
Roberto Becker
Flashcards noções de informática para concurso
OSVALDO TUON
SALESFORCE ADM-201 Certification Exam 1
Hawerth Castro
Avaliação Teórica - Sistemas Operacionais
niltonoliveira