1/195
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
A VPN encapsulates and encrypts data to provide a secure connection.
True
Which controls are looked at as technical Controls
A) IDs
B) Training manual
C) Firewall
D) AUP
IDs & Firewall
2 multiple choice options
Which type of injection attack uses keywords such as select and update to manipulate data through a web form
SQL injection
An end user calls the help desk complaining about a webpage not loading the most current date for the page unless the user refreshes the page. What should the help desk agent have the user do first?
Clear out the cache
When one suspects a device has been affected by malware what is the first step that should be taken to remediate the device?
disconnect the device from the network
A good audit plan may collect both successful and failed events,
True
Audit events take up computer resources and personnel time so you should be selective about the events to audit
True
You should always audit log on successes
False, track failed logon attempts instead
_________________ redirects internet traffic from one website to an identical-looking site to trick the user into entering their username and password into their database
Spoofing
What must take place for someone trying to enter a physical area of a building before access control takes place
Authentication
What is true about networks
1) WPA, and WPA2 can require authentication servers
2) WEP has been cracked and should no longer be in use
3) MAc filtering is best used for small wireless networks as MAC addresses need to be added to a MAC filtering table manually
One of the layers of defence in the anti-phishing and malware protection strategies developed by Microsoft is?
Smartscreen filter
One of the ways you can protect your computer from hackers and malicious software to use _____________?
Windows firewall
What is considered the minimum length of a good password
8 Characters
______________________ allows multiple computers on an internal network to share one public address?
NAT (Network Address translation)
Which type of VPN will often have a user connect through a web browser?
SSL
Which type of VPN connection usually connects two business entities?
site-to-site
What email filtering technique uses a list of verified DNS domains to verify that an email is coming from a trusted IP address?
SPF (Sender policy framework)
Application-level firewalls can provide content filtering and virus protection
True
Application-level firewall support caching
True
Application-level firewalls tend to be less resource-intensive than that of a traditional firewall
False
Application-level firewalls tend to be less resource intensive than that of a traditional firewall when they process application-level queries
True
Which if the following are NTFS permissions
Read,
Write,
Modify,
List folder contents,
Read & execute,
Full control
Which protocols are considered unsecured and should be avoided in a server environment?
1.PAP
2. SSH
3. CHAP
4. telnet
5. SFTP
PAP, telnet
Which type fo DNS record contains an IP address that is then used to lookup an associated host or domain name?
PTR (reverse-lookup pointer)
IPsec encrypts data packets using AH (Authentication header)
False
IPsec is a set of protocols that protects data transmission between hosts by providing authentication and privacy
True
IPsec is used to create a secure tunnel between two computing devices
True
IPsec uses digital signatures to create a chain of authority
False
Which of the following will be considered the strongest password?
A) jOhn$m1T
B) P@ssw0rd
C) Johnny
D) Password
jOhn$m1T
3 multiple choice options
Your IT dept is getting a barrage of calls from users saying that their pop-up blockers are not blocking ads for huge discounts on software. Upon further research, you also determined that your current malware signature files are not sufficient for removing this nuisance from your systems. What type of attack is taking place?
Adware
Your IT dept is getting a barrage of calls from users saying that their pop-up blockers are not blocking ads for huge discounts on software. Upon further research, you also determined that your current malware signature files are not sufficient for removing this nuisance from your systems. Which characteristic of the attack indicated that it's not being eradicated by anti-malware programs?
Zero-day attack
A certificate authority provides keys used in a digital certificate for authentication
True
In a public key infrastructure, the public key encrypts data and corresponding public key decrypt it
False, the public key encrypts data and a corresponding private key decrypts it.
Forging a fake sender address with an email message is an example of _________________ malware
Spoofing
Where do most computers obtain a media access control MAC address?
Network Interface
The tool used to view audit logs is an event viewer
True
You can audit logon failures to warn off hacking attacks
True
You can't limit the size of audit logs
False
CIA: Ensuring the sales dept can access a document
Availiability
CIA: Encrypting a document as it travels across a network
Confidentiality
CIA: Verifying the sender of a document
Integrity
Backs up of all files and resets the archive bit
Full backup
Backs up all change files since the last full or incremental backup
Incremental backup
Backs up all changed files since the last full backup
Differential backup
Which protocol should be allowed only on email servers used to send email and should be blocked on all other servers and client machines?
SMTP (simple mail transfers protocol)
How can a wireless network best be set up to allow only specific devices onto the network?
Mac address filtering
A Network Sniffer can easily obtain ________.
unencrypted passwords
Which Windows app is used to help protect a device against malware?
Windows defender
Which of the following are advanced permissions in NTFS? Choose 2
A) Change permissions
B) Full control
C) Take ownership
D) List folder contents
Change permissions, Take ownership
Bitlocker, when possible, stores the encryption key on a computer's ___________.
TPM (trusted platform module)
________________ is an authentication method that identifies individuals based on physical characteristics such as fingerprints, facial recognition, retina scans or voice patterns
Biometrics
A junior administrator asked what it means to harden a server. Which 2 statements fit the description of hardening a server?
A) Place the server in a secure location
B) minimise crosstalk
C) uninstall and unnecessary features
D) disable unnecessary services
uninstall and unnecessary features, disable unnecessary services
Malware that steals and encrypts data and demands money for the return of data is known as what type of malware?
Ransomware
A worm typically doesn't corrupt or modify files
True
A worm is a self-replicating program that copies itself to other computers without user intervention
True
A worm only passed by email
False
A worm uses system resources like bandwidth memory and processor time which makes the computer run slow
True
A worm is contained in most music and videos
False
Which password policy prohibits reusing the same password
History policy
Which protocols are used to encrypt emails. Choose 2
A) S/MIME
B) SSL
C) PGP
D) TLS
S/MIME & PGP
The process of eliminating risk by choosing not to participate in an action or activity describes which of the following?
A) Risk acceptance
B) Residual risk
C) Risk avoidance
D) Risk mitigates
Risk avoidance
A Junior administrator noticed when looking at the permissions of a folder grey checkboxes in the Allow column for a group's permissions. What do the grey check boxes represent?
Inherited permissions
Where are password policies established for an Active Directory domain?
Group policy
An acceptable use policy (AUP ) is an adminstrative control and so is a disaster recovery plan (DRP)
True
An intrusion prevention system (IPS) is a technical control
True
Which type of backup backs up all changed files since the last full back up?
Differential
In private browsing, history isn't saved
True
In private browsing, the workplace doesn't know which site one visited while private browsing
False
An internet service provider will not know the sites one visited while private browsing
False
Securtity compliance manager is an example of a __________________
Tool for desktop data center and cloud configurations
Which windows registry hive stores file extensions for applications?
HKEY_CLASSES_ROOT
Which windows registry hive stores current settings on the current user?
HKEY_CURRENT_USER
Which windows registry hive stores current settings on the computer?
HKEY_LOCAL_MACHINE
Which windows registry hive stores runtime information?
HKEY_CURRENT_CONFIGURATION
A __________________ is a computer used to trap hackers and distract them from real targets when the hackers are trying to attack network
honey pot
Bitlocker will use software based encryption _____________________________ a TPM on a device
in absense of
You're an intern for a small company. Recently you started receiving complaints that employees are having difficulty connecting to one of the servers and the server is responding slowly or not at all. When you monitor the packet traffic you notice a very high volume of packets being sent from 3 computers in the HR dept. What kind of attack is demonstated?
Denial of service
Which type of malware gains administrator-level access of system and targets items such as the BIOS, hypervisor, and kernel?
Rootkit
Asymmetric encryption uses a single key to perform encryption and decryption
False
DES is an aysmmetric encryption algorithm
False
RSA is an aysmmetric encryption algorithm
True
__________________ monitors packet traffic on a network and report the sender destination and type of packet
Network Sniffer
DNSSEC helps prevent pharming and MITM attacks
True
DNSSEC is proprietary to microsoft domain name servers
False
DNSSEC uses digital signature to create a chain of authority
True
Which internet technology poses the greatest risk to a user?
ActiveX Controls
Which 3 of the following are group scopes defined by Active directory
A) Domain security
B) Universal
C) Global
D) Local user
E) Domain local
Universal, Global, Domain local
The router can divide physical network into segments called _______
Subnets
An attack on your company server is being mase using the following:
Cookie
Cookie1982
Cookie293
Ccookie75
cookies
cooler
coolcool.
What kind of attack is this?
Dictionary Attack
An attack on your company server is being mase using the following:
Cookie
Cookie1982
Cookie293
Ccookie75
cookies
cooler
coolcool.
How do you prevent the attack?
you should enable the policy to audit failed logon events and account lockout after a reasonable number of attempts
An administrator configures a software restriction policy using the local security policy editor. How can the administrator make this policy apply to the entire Active Directory domain?
Export the policy and then import it into the group policy
You recently purchased a new home router and a new laptop computer. You want to connect to your personal home router using the strongest security available. On your computer, you open the wireless window to manually configure a profile. What security and encryption type should you choose?
WPA2 (Security), AES (encryption)
In which locations can system audit policies be set? Choose 2
A) Local security policy
B) Syslog
C) Event viewer
D) Group policy
Local security policy & group policy
What should be done to mobile devices used for business purposes if it's lost/stolen?
Remote wipe
Which is the most common format used for digital certificates?
x.509
This feature in Windows informs the users when the program makes a change that requires administrator-level permission. This feature is called ___________
User account control (UAC)
What does the minimum password age policy do?
Forces users to wait a certain amount of time before changing their password.
In which ways can security templates be deployed? Choose 2
A) GPO's
B) Security configuration and analysis snap in
C) Security compliance manager
D) Microsoft security baseline analyzer
GPOs (group polocy objects) and Secuirty configuratiosn & anaylsis snap in
Which type of list can be used as part of an anti-spam solution? Choose 2
A) DNSBLs
B) DNSWLs
C) RWLs
D) RBLs
DNSBLs & RBLs