SecurityFundamentals Part III Q51-75

Descripción

SecurityFundamentals Part III Q51-75
yacki Dubon
Test por yacki Dubon, actualizado hace más de 1 año
yacki Dubon
Creado por yacki Dubon hace más de 6 años
6
0

Resumen del Recurso

Pregunta 1

Pregunta
Question 51 You are setng up Remote Desktop on your computer. Your computer is a member of a domain. Your frewall confguraton is shown in the following image. You need to allow Remote Desktop to be able to get through your frewall for users on your company's network. Which setngs should you enable?
Respuesta
  • A. Remote Assistance: Home:Work (Private
  • B.Remote Desktop: Public
  • C.Remote Desktop: Home:Work (Private)
  • D.Remote Assistance: Domain

Pregunta 2

Pregunta
Question 52 You are trying to connect to an FTP server on the Internet from a computer in a school lab. You cannot get a connecton. You try on another computer with the same results. The computers in the lab are able to browse the Internet. You are able to connect to this FTP server from home. What could be blocking the connecton to the server?
Respuesta
  • A. A layer-2 switch
  • B.A wireless access point
  • C.A frewall
  • D.A layer-2 hub

Pregunta 3

Pregunta
Question 53 What does NAT do?
Respuesta
  • A. It encrypts and authentcates IP packets.
  • B.It provides caching and reduces network trafc.
  • C.It translates public IP addresses to private addresses and vice versa.
  • D.It analyzes incoming and outgoing trafc packets.

Pregunta 4

Pregunta
Question 54 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. Smart cards can be used in biometrics based systems [blank_start]YES[blank_end] Smartcard cards can be read from distances of several inches to many yards [blank_start]NO[blank_end] Smart cards provide a means of securely storing data on the card [blank_start]YES[blank_end]
Respuesta
  • YES
  • NO
  • YES

Pregunta 5

Pregunta
Question 55 The default password length for a Windows Server domain controller is:
Respuesta
  • 0
  • 5
  • 7
  • 14

Pregunta 6

Pregunta
Question 56 HOTSPOT Your supervisor asks you to review fle permission setngs on the applicaton.bat fle. You need to report which fle system the fle is on and the type of permission the fle has. You review the applicaton Propertes dialog box shown in the following image. Use the drop-down menus to select the answer choice that completes each statement. Each correct selecton is worth one point. 1-The "cygwin.bat" file in the image is currently on the _________ file system. 2- ___________permissions are currently being displayed for the "cygwin.bat" file.
Respuesta
  • FAT16
  • FAT32
  • NTFS
  • Basic
  • Advanced
  • Full control

Pregunta 7

Pregunta
Question 57 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. There are several built-in basic audit policies and advances audit polices in Windows [blank_start]YES[blank_end] Advanced audit policies applied by a Group Policy are compatible with a basic audit policy. [blank_start]NO[blank_end] A system access control list (SACL) enables administrators to log attempts to access a secure object [blank_start]YES[blank_end]
Respuesta
  • YES
  • NO
  • N
  • Y
  • Affirmative
  • Nega

Pregunta 8

Pregunta
Question 58 You create a web server for your school. When users visit your site, they get a certfcate error that says your site is not trusted. What should you do to fx this problem?
Respuesta
  • A. Install a certfcate from a trusted Certfcate Authority (CA).
  • B.Use a digital signature.
  • C.Generate a certfcate request.
  • D.Enable Public Keys on your website.

Pregunta 9

Pregunta
Question 59 What is an example of non-propagatng malicious code?
Respuesta
  • A. A back door
  • B.A hoax
  • C.A Trojan horse
  • D.A worm

Pregunta 10

Pregunta
Question 60 A brute force atack:
Respuesta
  • A. Uses response fltering
  • B.Tries all possible password variatons
  • C.Uses the strongest possible algorithms
  • D.Targets all the ports

Pregunta 11

Pregunta
Question 61 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. FAT32 has built-in security features that control user access [blank_start]NO[blank_end] NTFS has built-in security features that control file access [blank_start]YES[blank_end] All users on the same FAT32 file system have access rights to all files [blank_start]YES[blank_end]
Respuesta
  • NO
  • YES
  • YES

Pregunta 12

Pregunta
Question 62 Humongous Insurance is an online healthcare insurance company. During an annual security audit a security frm tests the strength of the company's password policy and suggests that Humongous Insurance implement password history policy. What is the likely reason that the security frm suggests this?
Respuesta
  • A. Past passwords were easily cracked by the brute force method.
  • B.Past passwords of users contained dictonary words.
  • C.Previous password breaches involved use of past passwords.
  • D.Past passwords lacked complexity and special characters.

Pregunta 13

Pregunta
Question 63 The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and saltng it with the WPS PIN. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Respuesta
  • A. Service Set Identfer (SSID)
  • B.Admin password
  • C.WEP key
  • D.No change is needed

Pregunta 14

Pregunta
Question 64 What are three major atack vectors that a social engineering hacker may use? (Choose three.)
Respuesta
  • A. Telephone
  • B.Reverse social engineering
  • C.Waste management
  • D.Honey pot systems
  • E.Firewall interface

Pregunta 15

Pregunta
Question 65 Which two security setngs can be controlled by using group policy? (Choose two.)
Respuesta
  • A. Password complexity
  • B.Access to the Run... command
  • C.Automatc fle locking
  • D.Encrypted access from a smart phone

Pregunta 16

Pregunta
Question 66 Cookies impact security by enabling: (Choose two.)
Respuesta
  • A. Storage of Web site passwords.
  • B.Higher security Web site protectons.
  • C.Secure Sockets Layer (SSL).
  • D.Web sites to track browsing habits.

Pregunta 17

Pregunta
Question 67 To keep third-party content providers from tracking your movements on the web, enable InPrivate Browsing. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.
Respuesta
  • A. InPrivate Filtering
  • B.SmartScreen Filter
  • C.Compatbility Mode
  • D.No change is needed

Pregunta 18

Pregunta
Question 68 Which enables access to all of the logged-in user's capabilites on a computer?
Respuesta
  • A. Java applets
  • B.ActveX controls
  • C.Actve Server Pages (ASP)
  • D.Microsof Silverlight

Pregunta 19

Pregunta
Question 69 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. Bitlocker to Go Reader allows you to encrypt drives [blank_start]NO[blank_end] BitLocker to Go Reader requires drives that are encrypted using a password [blank_start]YES[blank_end] BitLocker to Go works on Windows Vista and Windows XP [blank_start]YES[blank_end]
Respuesta
  • NO
  • YES
  • YES

Pregunta 20

Pregunta
Question 70 You need to install a domain controller in a branch ofce. You also need to secure the informaton on the domain controller. You will be unable to physically secure the server. Which should you implement?
Respuesta
  • A. Read-Only Domain Controller
  • B.Point-to-Point Tunneling Protocol (PPTP)
  • C.Layer 2 Tunneling Protocol (L2TP)
  • D.Server Core Domain Controller

Pregunta 21

Pregunta
Question 71 E-mail spoofng:
Respuesta
  • A. Forwards e-mail messages to all contacts
  • B.Copies e-mail messages sent from a specifc user
  • C.Obscures the true e-mail sender
  • D.Modifes e-mail routng logs

Pregunta 22

Pregunta
Question 72 What is the primary advantage of using Actve Directory Integrated Zones?
Respuesta
  • A. Zone encrypton
  • B.Password protecton
  • C.Non-repudiaton
  • D.Secure replicaton

Pregunta 23

Pregunta
Question 73 Which two are included in an enterprise antvirus program? (Choose two.)
Respuesta
  • A. Atack surface scanning
  • B.On-demand scanning
  • C.Packet scanning
  • D.Scheduled scanning

Pregunta 24

Pregunta
Question 74 Phishing is an atempt to:
Respuesta
  • A. Obtain informaton by posing as a trustworthy entty.
  • B.Limit access to e-mail systems by authorized users.
  • C.Steal data through the use of network intrusion.
  • D.Corrupt e-mail databases through the use of viruses.

Pregunta 25

Pregunta
Question 75 Humongous Insurance needs to set up a domain controller in a branch ofce. Unfortunately, the server cannot be sufciently secured from access by employees in that ofce, so the company is installing a Primary Domain Controller. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Respuesta
  • A. Read-Only Domain Controller
  • B.Backup Domain Controller
  • C.Actve Directory Server
  • D.No change is needed.
Mostrar resumen completo Ocultar resumen completo

Similar

Diapositivas de Topología de Redes
lisi_98
Fase 5. Evaluar. Sustentar el diseño de modelo de propagación. MAPA DE RFID
Miller Suárez López
TEORIA DESCRIPCION DE LA FORMA
Stiven Ramirez
Construcción de software
CRHISTIAN SUAREZ
FUNCIONES MULTIVARIABLES
Jarumy cecilia Sánchez Hernández
Proceso de Simulación
Jesus Javier
Dibujo de ingeniería
Felipe Granada
Competencias Laborales de un Ingeniero en Diseño de Entretenimiento Digital
Daniel Giraldo
Modelos de Gestión de Inventarios en Cadenas de Abastecimiento
Rubén Darío Martínez Lira
Mapa conceptual "Vientos"
Muñoz Rey Antonio
Ingenieria Social
Diego Gutierrez