Frage 1
Frage
Which of the following is the method used to gain access to data, systems, or networks,
primarily through misrepresentation and relies on the trusting nature of the person being
attacked?
Antworten
-
Non-Repudiation
-
Attack Surface
-
IPAM
-
Social Engineering
Frage 2
Frage
True or False: Biometrics are a good way to secure certain areas of a building.
Frage 3
Frage
Which of the following are very common social engineering tactics?
Frage 4
Frage
True or False: A laptop cannot be secured to a desk or workspace in a convenient manner.
Frage 5
Frage
What type of Windows Server is responsible for storing, accessing and managing an Active
Directory implementation?
Antworten
-
DHCP
-
Print Server
-
File Server
-
Workstation
-
Domain Controller
Frage 6
Frage
Which of the following is the process of tracking users who have logged in and what those
user have accessed or tried to access?
Antworten
-
Auditing
-
Active Directory
-
Encryption
-
Non-Repudiation
-
RADIUS
Frage 7
Frage
What is Microsoft’s technology for centrally tracking and managing users and information
about them?
Frage 8
Frage
True or False: PGP is the encryption technology used to secure websites on the internet.
Frage 9
Frage
What is the process of identifying an individual, usually based on a username and password?
Antworten
-
Auditing
-
Authentication
-
Authorization
-
Encryption
Frage 10
Frage
Which of the following is a valid network troubleshooting tool that can be used by someone trying to steal
data or logon credentials from a network?
Antworten
-
nslookup
-
DNS
-
Wire Tester
-
Network Sniffer
Frage 11
Frage
Which of the following is a crude type of attack that attempts to compromise a password
by trying all possible combinations of permitted character types?
Antworten
-
Social Engineering
-
Dictionary Attack
-
Man-in-the-Middle
-
Brute Force Attac
-
Denial-of-Service (DoS)
Frage 12
Frage
Microsoft provides which of the following as a password policy option to prevent password
attacks from being effective?
Antworten
-
SSL
-
Physical Security
-
DHCP
-
Smart Cards
-
Account Lockout
Frage 13
Frage
True or False: Password attacks are a very common way for attackers to attempt to
compromise a computer or network.
Frage 14
Frage
The shortest possible amount of time that a user is required to use the same password per a
password policy is known as?
Antworten
-
Non-Repudiation
-
Encryption
-
Password History
-
Minimum Password Age
-
Complex Password
Frage 15
Frage
This can be used to serve as a buffer between to networks and provide isolation to certain
network services:
Antworten
-
Firewall
-
Server
-
Perimeter Network
-
Router
-
Organizational Unit
Frage 16
Frage
True or False: Firewalls operate at layer 6 of the OSI model.
Frage 17
Frage
True or False: A honeypot is an effective deterrent to hackers successfully compromising
your network.
Frage 18
Frage
Which of the following are protocols commonly used in VPN implementations? (Choose four)
Antworten
-
Secure Sockets Layer (SSL)
-
Point-to-Point Tunneling Protocol (PPTP)
-
Secure Socket Tunneling Protocol (SSTP)
-
Hypertext Transfer Protocol (HTTP)
-
IPSec
Frage 19
Frage
Which of the following is a method used to analyze the health of computers attempting to
connect to the network and allow or deny access to the network based on the results?
Frage 20
Frage
True or False: The windows firewall can be centrally managed using group policy.
Frage 21
Frage
When a user receives an email or sees a pop-up windows warning them of a virus infection
and either asks them to forward the warning on or provides a link to download software to
remove the threat it is know as a:
Frage 22
Frage
Which of the following features of Internet Explorer can assist an administrator or user in
securing the browsing experience?
Frage 23
Frage
True or False: Malware is software designed to infiltrate or affect a computer system
without the owner’s informed consent.
Frage 24
Frage
True or False: Microsoft provides an anti-malware/anti-virus package for windows