Missed MTA Questions

Beschreibung

Quiz am Missed MTA Questions, erstellt von Sage Lika am 23/04/2018.
Sage Lika
Quiz von Sage Lika, aktualisiert more than 1 year ago
Sage Lika
Erstellt von Sage Lika vor mehr als 6 Jahre
14
0

Zusammenfassung der Ressource

Frage 1

Frage
What does NAT do?
Antworten
  • It encrypts and authenticates IP packets
  • It provides caching and reduces network traffic.
  • It translates public IP addresses to private addresses and vice versa.
  • It analyzes incoming and outgoing traffic packets.

Frage 2

Frage
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?
Antworten
  • • A. Windows XP Professional Service Pack 3
  • • B. Windows Vista Enterprise Edition
  • • C. Windows 7 Enterprise Edition
  • • D. Windows 2000 Professional Service Pack 4

Frage 3

Frage
The Active Directory controls, enforces, and assigns security policies and access rights for all users. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Antworten
  • • A. NTFS permissions
  • • B. User Account Control
  • • C. Registry
  • • D. No change is needed

Frage 4

Frage
To protect systems from buffer overflow errors, you can use:
Antworten
  • • A. Antivirus software
  • • B. Data Execution Prevention
  • • C. A proxy server
  • • D. An Intruder Prevention System

Frage 5

Frage
You want to make your computer resistant to online hackers and malicious software. What should you do?
Antworten
  • • A. Configure a forward proxy.
  • • B. Install anti-virus software.
  • • C. Enable spam filtering.
  • • D. Turn on Windows Firewall.

Frage 6

Frage
The certificate of a secure public Web server on the Internet should be:
Antworten
  • • A. Issued by a public certificate authority (CA)
  • • B. Signed by using a 4096-bit key
  • • C. Signed by using a 1024-bit key
  • • D. Issued by an enterprise certificate authority (CA)

Frage 7

Frage
What is a common method for password collection?
Antworten
  • • A. Email attachments
  • • B. Back door intrusions
  • • C. SQL Injection
  • • D. Network sniffers

Frage 8

Frage
Keeping a server updated:
Antworten
  • • A. Maximizes network efficiency
  • • B. Fixes security holes
  • • C. Speeds up folder access
  • • D. Synchronizes the server

Frage 9

Frage
What is an example of non-propagating malicious code?
Antworten
  • • A. A back door
  • • B. A hoax
  • • C. A Trojan horse
  • • D. A worm

Frage 10

Frage
Windows Server Update Services (WSUS) is a tool that:
Antworten
  • • A. Updates data stored in Windows servers
  • • B. Manages the services that run on a server
  • • C. Updates licensing for Windows servers
  • • D. Manages updates for Microsoft software

Frage 11

Frage
In Internet Explorer 8, the InPrivate Browsing feature prevents:
Antworten
  • • A. Unauthorized private data input.
  • • B. Unencrypted communication between the client computer and the server.
  • • C. User credentials from being sent over the Internet.
  • • D. Any session data from being stored on the computer.

Frage 12

Frage
Which enables you to change the permissions on a folder?
Antworten
  • • A. Take ownership
  • • B. Extended attributes
  • • C. Auditing
  • • D. Modify

Frage 13

Frage
You suspect a user's computer is infected by a virus. What should you do first?
Antworten
  • • A. Restart the computer in safe mode
  • • B. Replace the computer's hard disk drive
  • • C. Disconnect the computer from the network
  • • D. Install antivirus software on the computer

Frage 14

Frage
You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen. What should you implement?
Antworten
  • • A. File-level permissions
  • • B. Advanced Encryption Standard (AES)
  • • C. Folder-level permissions
  • • D. Distributed File System (DFS)
  • • E. BitLocker

Frage 15

Frage
Which is a special folder permission?
Antworten
  • • A. Read
  • • B. Modify
  • • C. Write
  • • D. Delete

Frage 16

Frage
Network Access Protection (NAP) enables administrators to control access to network resources based on a computer's:
Antworten
  • • A. Encryption level
  • • B. Warranty
  • • C. Physical location
  • • D. Configuration

Frage 17

Frage
A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Antworten
  • • A. Decrease the chances of a virus getting to a client machine
  • • B. Verify that the senders of the messages are legitimate
  • • C. Ensure that all links in the messages are trustworthy
  • • D. No change is needed.

Frage 18

Frage
When conducting a security audit the first step is to:
Antworten
  • • A. Inventory the company's technology assets
  • • B. Install auditing software on your servers
  • • C. Set up the system logs to audit security events
  • • D. Set up a virus quarantine area

Frage 19

Frage
You create a new file in a folder that has inheritance enabled. By default, the new file:
Antworten
  • • A. Takes the permissions of the parent folder
  • • B. Does not take any permissions
  • • C. Takes the permissions of other folders in the same directory
  • • D. Takes the permissions of other files in the same directory

Frage 20

Frage
Windows Firewall is a built-in. host-based, stateless firewall. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Antworten
  • • A. Stateful
  • • B. Network layer
  • • C. Packet filter
  • • D. No change is needed

Frage 21

Frage
What is the primary advantage of using Active Directory Integrated Zones?
Antworten
  • • A. Zone encryption
  • • B. Password protection
  • • C. Non-repudiation
  • • D. Secure replication

Frage 22

Frage
You need to limit the programs that can run on client computers to a specific list. Which technology should you implement?
Antworten
  • • A. Windows Security Center
  • • B. Security Accounts Manager
  • • C. System Configuration Utility
  • • D. AppLocker group policies

Frage 23

Frage
The primary purpose of Network Access Protection (NAP) is to prevent:
Antworten
  • • A. Loss of data from client computers on a network.
  • • B. Non-compliant systems from connecting to a network.
  • • C. Users on a network from installing software.
  • • D. Unauthorized users from accessing a network.

Frage 24

Frage
You are trying to establish communications between a client computer and a server. The server is not responding. You confirm that both the client and the server have network connectivity. Which should you check next?
Antworten
  • • A. Microsoft Update
  • • B. Data Execution Prevention
  • • C. Windows Firewall
  • • D. Active Directory Domains and Trusts

Frage 25

Frage
You would implement a wireless intrusion prevention system to:
Antworten
  • • A. Prevent wireless interference
  • • B. Detect wireless packet theft
  • • C. Prevent rogue wireless access points
  • • D. Enforce SSID broadcasting

Frage 26

Frage
You are trying to connect to an FTP server on the Internet from a computer in a school lab. You cannot get a connection. You try on another computer with the same results. The computers in the lab are able to browse the Internet. You are able to connect to this FTP server from home. What could be blocking the connection to the server?
Antworten
  • • A. A layer-2 switch
  • • B. A wireless access point
  • • C. A firewall
  • • D. A layer-2 hub

Frage 27

Frage
Which enables access to all of the logged-in user's capabilities on a computer?
Antworten
  • • A. Java applets
  • • B. ActiveX controls
  • • C. Active Server Pages (ASP)
  • • D. Microsoft Silverlight

Frage 28

Frage
Which two security settings can be controlled by using group policy? (Choose two.)
Antworten
  • • A. Password complexity
  • • B. Access to the Run... command
  • • C. Automatic file locking
  • • D. Encrypted access from a smart phone

Frage 29

Frage
Which two are included in an enterprise antivirus program? (Choose two.)
Antworten
  • • A. Attack surface scanning
  • • B. On-demand scanning
  • • C. Packet scanning
  • • D. Scheduled scanning

Frage 30

Frage
Which three elements does HTTPS encrypt? (Choose three.)
Antworten
  • • A. Browser cookies
  • • B. Server IP address
  • • C. Port numbers
  • • D. Website URL
  • • E. Login information

Frage 31

Frage
What are three examples of two-factor authentication? (Choose three.)
Antworten
  • • A. A fingerprint and a pattern
  • • B. A password and a smart card
  • • C. A username and a password
  • • D. A password and a pin number
  • • E. A pin number and a debit card

Frage 32

Frage
Select which of the following is true.
Antworten
  • Because senior executives have rights to access sensitive data, they should use administrator accounts.
  • The UAC has one overall goal: to grant users the lowest level permissions required to complete their tasks
  • System administrators should use a standard user account when performing routine functions like reading emails and browsing the Internet.

Frage 33

Frage
Select which of the following is true.
Antworten
  • IPsec requires network applications to be IPsec aware
  • IPsec encrypts data.
  • IPsec adds overhead for all network communications for which it is used.

Frage 34

Frage
Select which of the following is true.
Antworten
  • UAC reduces your permissions to that of a standard user unless higher permissions are necessary
  • UAC notifies you when additional permissions are required and asks if you wish to continue.
  • UAC cannot be disabled.

Frage 35

Frage
Select which of the following is true.
Antworten
  • BitLocker to Go Reader allows you to encrypt drives
  • BitLocker to Go Reader required drives that are encrypted using a password
  • BitLocker to Go works on Windows Vista and Windows XP

Frage 36

Frage
Select which of the following is true.
Antworten
  • By using NAP, administrators can place non-compliant computers onto restricted networks
  • All computers that are not in compliance with NAP policies require manual intervention to be brought into compliance
  • NAP can enforce that client computers are running firewall

Frage 37

Frage
Select which of the following is true.
Antworten
  • FAT32 has built-in security features that control user access
  • NTFS has built-in security features that control file access
  • All users on the same FAT32 file system have access rights to all files

Frage 38

Frage
_____ provides secure access to a network over the internet.
Antworten
  • NAP
  • VPN
  • NIP
  • NAT

Frage 39

Frage
_______ is an NTFS special permission.
Antworten
  • Full Control
  • Take Ownership
  • Clear
  • Write

Frage 40

Frage
What is the minimum character length requirement for the password of a domain controller?
Antworten
  • 0
  • 14
  • 1
  • 7

Frage 41

Frage
What infrastructure is used to assign and validate digital certificates?
Antworten
  • VPN
  • Active directory
  • PKI
  • Asymmetric algorithm

Frage 42

Frage
You are setting up your first workstation securely with Windows 7 professional and setting the password history. What are the minimum and maximum settings that you can use?
Antworten
  • 0, 14
  • 0, 255
  • 1, 14
  • 0, 24

Frage 43

Frage
One of the ways you can protect your computer from hackers and malicious software is to use _________.
Antworten
  • Windows Firewall
  • email filtering
  • Windows Security Essentials
  • spam filtering
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

LEK 1
Max Muster
Lerntheorien
Pet Rei
Öff. Recht - Streitigkeiten Verwaltungsrecht AT
myJurazone
Fragenkatalog Wirtschaftspolitik
Isaak Roscher
Unsere Erde - Sonnensystem, Klima, Erdschichten etc.
Laura Overhoff
1.2 Die Entwicklung der modernen Psychologie
achdrewes
Vetie - Tierzucht & Genetik - T II
Fioras Hu
Jour Gesko WS 18/19
Adrienne Tschaudi
Vetie Chirugie 2015
Svea Schill
Vetie Pharma 2019
Lea Schmidt
Probefragen Tierschutz & Ethologie 2021
Nadine Zachau