Security Fundamentals Parte I - Q 1-25

Description

Security Fundamentals Q 1-25
yacki Dubon
Quiz by yacki Dubon, updated more than 1 year ago
yacki Dubon
Created by yacki Dubon almost 6 years ago
111
0

Resource summary

Question 1

Question
Windows Firewall is a built-in. host-based, stateless frewall. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Answer
  • Stateful
  • Network layer
  • Packet flter
  • No change is needed

Question 2

Question
HOTSPOT Alice sends her password to the game server in plaintext. Chuck is able to observe her password. The scenario demostrated is an [blank_start]Eavesdropping[blank_end] attack. Alice should [blank_start]never send a plaintext password[blank_end]. to avoid this type of attack.
Answer
  • Eavesdropping
  • never send a plaintext password

Question 3

Question
Question 3 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. IpSec requires network application to be IPSec aware [blank_start]NO[blank_end] Ipsec encrypts data [blank_start]YES[blank_end] IPsec adds overhead for all network communications for which it is used. [blank_start]YES[blank_end]
Answer
  • NO
  • YES
  • YES

Question 4

Question
Question 3 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. Honeypots are primarily used to attact potential attakers or hackers. [blank_start]YES[blank_end] By setting up honey pot an administrator can get insightful information about the atttacker such IP address. [blank_start]YES[blank_end] A honeypot is an appliance pr piece of software that allows or denies network access based on preconfigured set of rules. [blank_start]NO[blank_end]
Answer
  • YES
  • YES
  • NO

Question 5

Question
Question 5 Bridging is a process of sending packets from source to destnaton on OSI layer 3. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Answer
  • Routng
  • Switching
  • Repeatng
  • No change is needed.

Question 6

Question
Question 6 The primary purpose of Network Access Protecton (NAP) is to prevent:
Answer
  • A. Loss of data from client computers on a network.
  • B.Non-compliant systems from connectng to a network.
  • C.Users on a network from installing sofware.
  • D.Unauthorized users from accessing a network.

Question 7

Question
Question 7 You want to make your computer resistant to online hackers and malicious sofware. What should you do?
Answer
  • A. Confgure a forward proxy.
  • B.Install ant-virus sofware.
  • C.Enable spam fltering.
  • D.Turn on Windows Firewall.

Question 8

Question
Question 8 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. An intruder can spoof MAC addresses to get aroud MAC address filtering [blank_start]YES[blank_end] Intruders can find a wireless network if the Service SEtIdentifier (SSID) is hidden. [blank_start]YES[blank_end] WEP security is strong as long as it has a 128-bit key. [blank_start]NO[blank_end]
Answer
  • YES
  • YES
  • NO

Question 9

Question
Your company requires that users type a series of characters to access the wireless network. The series of characters must meet the following requirements: Contains more than 15 characters Contains at least one leter Contains at least one number Contains at least one symbol Which security technology meets these requirements?
Answer
  • WEP
  • B.WPA2 PSK
  • C.WPA2 Enterprise
  • D.MAC fltering

Question 10

Question
Question 10 Many Internet sites that you visit require a user name and password. How should you secure these passwords?
Answer
  • A. Save them to a text fle
  • B.Enable session caching
  • C.Confgure the browser to save passwords
  • D.Save them to an encrypted fle
  • E.Reuse the same password

Question 11

Question
Question 11 You are an intern for a company where your manager wants to be sure you understand the social engineering threats that may occur. Your manager emphasizes the principles of the Microsof Defense-in-Depth Security Model shown in the following image: The policies, procedures and awareness defense targets staff with an organization, explaning what to do, when, why and by whom. The overarching defense of the Microsoft Defense-inDepth Security Model is Data Defenses.
Answer
  • data defense
  • Policies,procedures and awareness

Question 12

Question
Question 12 Physically securing servers prevents:
Answer
  • A. Thef
  • B.Compromise of the certfcate chain
  • C.Man-in-the middle atacks
  • D.Denial of Service atacks

Question 13

Question
Question 13 To prevent users from copying data to removable media, you should:
Answer
  • A. Lock the computer cases
  • B.Apply a group policy
  • C.Disable copy and paste
  • D.Store media in a locked room

Question 14

Question
Question 14 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. BEcuase senior executives have rights to access sensitive data, they should use administrators accounts. [blank_start]YES[blank_end] The User Account Control (UAC ) has one overall goal: grant users the lowest level permissions required to complete their task. [blank_start]YES[blank_end] System administrators should use a standard user account when performing routine functions like reading emails and browsing the internet. [blank_start]YES[blank_end]
Answer
  • YES
  • NO
  • YES
  • NO
  • YES
  • NO

Question 15

Question
Question 15 You are an intern at Wide World Importers and help manage 1000 workstatons. All the workstatons are members of an Actve Domain. You need to push out an internal certfcate to Internet Explorer on all workstatons. What is the quickest method to do this?
Answer
  • A. Local policy
  • B.Logon script
  • C.Windows Update
  • D.Group policy

Question 16

Question
Question 17 The purpose of a digital certfcate is to verify that a:
Answer
  • A. Public key belongs to a sender.
  • B.Computer is virus-free.
  • C.Private key belongs to a sender.
  • D.Digital document is complete.

Question 17

Question
Question 18 A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Answer
  • A. Decrease the chances of a virus getng to a client machine
  • B.Verify that the senders of the messages are legitmate
  • C.Ensure that all links in the messages are trustworthy
  • D.No change is needed.

Question 18

Question
Question 19 You are volunteering at an organizaton that gets a brand new web server. To make the server more secure, you should add a second administrator account. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Answer
  • A. Disable unused services
  • B.Enable LM authentcaton
  • C.Enable NTLM authentcaton
  • D.No change is needed.

Question 19

Question
Question 20 Role separaton improves server security by:
Answer
  • A. Enforcing principle of least privilege.
  • B.Installing applicatons on separate hard disks.
  • C.Physically separatng high security servers from other servers.
  • D.Placing servers on separate VLANs.

Question 20

Question
Question 21 The Windows Firewall protects computers from unauthorized network connectons. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.
Answer
  • A. Email viruses
  • B.Phishing scams
  • C.Unencrypted network access
  • D.No change is needed

Question 21

Question
Question 22 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. Tools like Microsoft Security Compliance Manager and Microsoft Baseline SEcurity Analyzer can assist with server hardening. [blank_start]YES[blank_end] Administrator passwords may contain ASCII characters generated by a combination of the ALT key and 3 digits on the numerical keypad [blank_start]YES[blank_end] The removal of unused registry entries and executing increases teh surface vulnerability of the server. [blank_start]NO[blank_end]
Answer
  • YES
  • YES
  • NO

Question 22

Question
Question 23 Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one. Which server is best to use as a web server, considering the security and performance concerns?
Answer
  • A. SQL Server
  • B.File Server
  • C.Domain Controller
  • D.Applicaton Server

Question 23

Question
Question 24 A user who receives a large number of emails selling prescripton medicine is probably receiving pharming mail. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Answer
  • A. Malware
  • B.Spoofed mail
  • C.Spam
  • D.No change is needed.

Question 24

Question
Question 25 The client computers on your network are stable and do not need any new features. Which is a beneft of applying operatng system updates to these clients?
Answer
  • A. Keep the sofware licensed
  • B.Keep the server ports available
  • C.Update the hardware frewall
  • D.Close existng vulnerabilites

Question 25

Question
Question 16 In Internet Explorer 8, the InPrivate Browsing feature prevents:
Answer
  • A. Unauthorized private data input.
  • B.Unencrypted communicaton between the client computer and the server.
  • C.User credentals from being sent over the Internet.
  • D.Any session data from being stored on the computer.
Show full summary Hide full summary

Similar

Diapositivas de Topología de Redes
lisi_98
Fase 5. Evaluar. Sustentar el diseño de modelo de propagación. MAPA DE RFID
Miller Suárez López
TEORIA DESCRIPCION DE LA FORMA
Stiven Ramirez
Construcción de software
CRHISTIAN SUAREZ
FUNCIONES MULTIVARIABLES
Jarumy cecilia Sánchez Hernández
Proceso de Simulación
Jesus Javier
Dibujo de ingeniería
Felipe Granada
Competencias Laborales de un Ingeniero en Diseño de Entretenimiento Digital
Daniel Giraldo
Modelos de Gestión de Inventarios en Cadenas de Abastecimiento
Rubén Darío Martínez Lira
Ingenieria Social
Diego Gutierrez
PROYECTOS DE INVERSIÓN
Pedro Martinez