CoolUsername7
Quiz von , erstellt am more than 1 year ago

review for chapter 10

40
0
0
CoolUsername7
Erstellt von CoolUsername7 vor mehr als 8 Jahre
Schließen

Chapter 10 Review

Frage 1 von 22

1

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

Wähle eine der folgenden:

  • social engineering

  • anonymous keylogging

  • spam

  • DDoS

Erklärung

Frage 2 von 22

1

Which two security precautions will help protect a workplace against social engineering? (Choose two.)

Wähle eine oder mehr der folgenden:

  • ensuring that each use of an access card allows access to only one user at the time

  • ensuring that all operating system and antivirus software is up to date

  • encrypting all sensitive data stored on the servers
    performing daily data backups

  • registering and escorting all visitors to the premises

Erklärung

Frage 3 von 22

1

What are two typical physical security precautions that a business can take to protect its computers and systems? (Choose two.)

Wähle eine oder mehr der folgenden:

  • Perform daily data backups.

  • Replace any software firewalls with a hardware firewall.

  • Implement biometric authentication.

  • Ensure that all operating system and antivirus software is up to date.

  • Disable the autorun feature in the operating system.

Erklärung

Frage 4 von 22

1

Which physical security technology can hold user authentication information, include software license protection, provide encryption, and provide hardware and software authentication that is specific to the host system?

Wähle eine der folgenden:

  • biometric authentication

  • Trusted Platform Module (TPM)

  • card key access

  • two-factor security

Erklärung

Frage 5 von 22

1

It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)

Wähle eine oder mehr der folgenden:

  • Set virus protection software to scan removable media when data is accessed.

  • Configure the Windows Firewall to block the ports that are used by viruses.

  • Enable the TPM in the CMOS settings.

  • Repair, delete, or quarantine the infected files.

  • Disable the autorun feature in the operating system.

Erklärung

Frage 6 von 22

1

In which situation would a computer technician use the fixmbr command at the command prompt of a Windows XP computer to resolve a security issue?

Wähle eine der folgenden:

  • when unauthorized users have changed the CMOS settings and the CMOS password must be reset

  • when a virus has damaged the master boot record of the system disk

  • when a virus has damaged the boot sector of the system disk

  • when the folder permissions for user members of a group are incorrect

Erklärung

Frage 7 von 22

1

All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to solve this issue?

Wähle eine der folgenden:

  • Set the user folder permissions to Deny.

  • Disable the users’ accounts.

  • Change the user file permissions to Read Only.

  • Enable UAC on the computer.

Erklärung

Frage 8 von 22

1

You want to dispose of a 2.5 terabyte hard drive that contains confidential financial information. What is the recommended procedure to achieve this?

Wähle eine der folgenden:

  • Use data wiping.

  • Drill through the HDD.

  • Smash the platters with a hammer.

  • Immerse the HDD in a weak solution of bicarbonate of soda.

Erklärung

Frage 9 von 22

1

What is the most effective way of securing wireless traffic?

Wähle eine der folgenden:

  • WPA2

  • SSID hiding

  • WEP

  • wireless MAC filtering

Erklärung

Frage 10 von 22

1

Which two items are used in asymmetric encryption? (Choose two.)

Wähle eine oder mehr der folgenden:

  • a token

  • a TPM

  • a private key

  • a DES key

  • a public key

Erklärung

Frage 11 von 22

1

Which two characteristics describe a worm? (Choose two.)

Wähle eine oder mehr der folgenden:

  • hides in a dormant state until needed by an attacker

  • infects computers by attaching to software code

  • executes when software is run on a computer

  • is self-replicating

  • travels to new computers without any intervention or knowledge of the user

Erklärung

Frage 12 von 22

1

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

Wähle eine der folgenden:

  • worm

  • phishing

  • adware

  • stealth virus

Erklärung

Frage 13 von 22

1

Which three questions should be addressed by organizations developing a security policy? (Choose three.)
How should future expansion be done?

Wähle eine oder mehr der folgenden:

  • What are the possible threats to the assets of the organization?

  • What is to be done in the case of a security breach?

  • When do the assets need protecting?

  • What assets require protection?

  • What insurance coverage is required?

Erklärung

Frage 14 von 22

1

What does a malware detection program look for when running a scan?

Wähle eine der folgenden:

  • a service pack

  • patterns in the programming code of the software on a computer

  • mirror sites

  • patches that prevent a newly discovered virus or worm from making a successful attack

Erklärung

Frage 15 von 22

1

Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

Wähle eine der folgenden:

  • Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.

  • All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.

  • All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

  • Any traffic that comes into port 25 allows outgoing port 113 to be used.

Erklärung

Frage 16 von 22

1

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

Wähle eine oder mehr der folgenden:

  • packet size

  • physical addresses

  • protocols

  • packet speed

  • ports

Erklärung

Frage 17 von 22

1

What is the primary goal of a DoS attack?

Wähle eine der folgenden:

  • to facilitate access to external networks

  • to prevent the target server from being able to handle additional requests

  • to scan the data on the target server

  • to obtain all addresses in the address book within the server

Erklärung

Frage 18 von 22

1

Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?

Wähle eine der folgenden:

  • Have you scanned your computer recently for viruses?

  • What symptoms are you experiencing?

  • Did you open any attachments from a suspicious email message?

  • Is your security software up to date?

Erklärung

Frage 19 von 22

1

Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?

Wähle eine der folgenden:

  • Install rogue antivirus software on the host.

  • Log on to the host as a different user.

  • Disable ActiveX and Silverlight on the host.

  • Disconnect the host from the network.

Erklärung

Frage 20 von 22

1

A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?

Wähle eine der folgenden:

  • Ensure the security policy is being enforced.

  • Check the computer for the latest OS patches and updates.

  • Scan the computer with protection software.

  • Verify the physical security of all offices.

Erklärung

Frage 21 von 22

1

A user has reported that a computer web browser will not display the correct home page even if the default page is reset. What is the likely cause of this problem?

Wähle eine der folgenden:

  • A virus has damaged the boot sector of the system disk.

  • The computer has been infected with spyware.

  • UAC has been disabled on the computer.

  • Folder permissions have been changed from Deny to Allow.

Erklärung

Frage 22 von 22

1

What is the name given to the programming-code patterns of viruses?

Wähle eine der folgenden:

  • mirrors

  • signatures

  • virus definition tables

  • grayware

Erklärung