CET_TARDE - Security Fundamentals 2017 - Part 1

Descripción

Security Fundamentals Quizzes
Hawerth Castro
Test por Hawerth Castro, actualizado hace más de 1 año
Hawerth Castro
Creado por Hawerth Castro hace más de 7 años
81
0

Resumen del Recurso

Pregunta 1

Pregunta
Which type of malware can copy itself and infect a computer without the user’s consent or knowledge?
Respuesta
  • virus
  • Trojan horse
  • rootkit
  • backdoor

Pregunta 2

Pregunta
What type of self-replicating program copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources?
Respuesta
  • virus
  • Trojan horse
  • worm
  • backdoor

Pregunta 3

Pregunta
What malware looks like a useful or desired executable program but is in reality program that is supposed to cause harm to your computer or steal information from your computer?
Respuesta
  • virus
  • Trojan horse
  • worm
  • backdoor

Pregunta 4

Pregunta
What malware collects a user’s personal information or details about your browsing habits without your knowledge?
Respuesta
  • virus
  • Trojan horse
  • worm
  • spyware

Pregunta 5

Pregunta
What malware gives administrator-level control over a computer system?
Respuesta
  • rootkit
  • Trojan horse
  • worm
  • spyware

Pregunta 6

Pregunta
What software component comes with Windows Vista and Windows 7 to defend against spyware?
Respuesta
  • Windows Firewall
  • Windows Defender
  • UAC
  • Windows Anti-virus

Pregunta 7

Pregunta
What do you call a message warning you to delete an essential Windows file?
Respuesta
  • virus hoax
  • keylogger
  • backdoor
  • worm

Pregunta 8

Pregunta
What server can be used to install Windows updates for your organization?
Respuesta
  • SCOM
  • WSUS
  • IIS
  • WDS

Pregunta 9

Pregunta
What do you call multiple Windows updates that have been packaged together as one installation and are well tested?
Respuesta
  • service packs
  • cumulative packs
  • critical update
  • optional update

Pregunta 10

Pregunta
What Windows feature notifies you when something tries to make changes to your computer without your knowledge?
Respuesta
  • WDS
  • NAT
  • Windows Defender
  • UAC

Pregunta 11

Pregunta
What host firewall is included with Windows 7?
Respuesta
  • Windows Firewall
  • Windows Defender
  • Microsoft Protector
  • Microsoft Safety Net

Pregunta 12

Pregunta
What do you call unsolicited junk email?
Respuesta
  • spam
  • j-mail
  • junkettes
  • Infected mail

Pregunta 13

Pregunta
What email validation system is designed to stop spam that uses source address spoofing?
Respuesta
  • Foremost Relay System
  • Sender Policy Framework
  • Spam Checking Networking
  • Spoof Checker

Pregunta 14

Pregunta
What do spammers and hackers look for when they want to send email through your network?
Respuesta
  • open SMTP servers
  • open web servers
  • open POP3 servers
  • open FTP servers

Pregunta 15

Pregunta
Which tab in Internet Explorer settings would you use to delete history and cookies?
Respuesta
  • General
  • Privacy
  • Security
  • Advanced

Pregunta 16

Pregunta
Which Internet Explorer zone is the least secure?
Respuesta
  • Internet zone
  • local intranet zone
  • trusted sites zone
  • restricted sites zone

Pregunta 17

Pregunta
What technique is used to send you to a fake, but realistic-looking, website to verify your account information?
Respuesta
  • spoofing
  • smurfing
  • man-in-the-middle
  • phishing

Pregunta 18

Pregunta
Which of the following terms indicates that information is to be read only by those people for whom it is intended?
Respuesta
  • confidentiality
  • integrity
  • availability
  • accounting

Pregunta 19

Pregunta
What technology is not used to implement confidentiality?
Respuesta
  • encryption
  • access controls
  • auditing
  • authentication

Pregunta 20

Pregunta
Which of the following makes sure that data is not changed when it not supposed to be?
Respuesta
  • confidentiality
  • integrity
  • availability
  • accounting

Pregunta 21

Pregunta
Which of the following is not a response when dealing with a risk?
Respuesta
  • avoidance
  • mitigation
  • transfer
  • patching

Pregunta 22

Pregunta
What do you call the security discipline that requires that a user is given no more privilege necessary to perform his or her job?
Respuesta
  • defense in depth
  • reduction of attack surface
  • risk transfer
  • principle of least privilege

Pregunta 23

Pregunta
What do you call the scope that hacker can use to break into a system?
Respuesta
  • defense in depth
  • attack surface
  • principle of least privilege
  • risk mitigation

Pregunta 24

Pregunta
What method used by a hacker relies on the trusting nature of the person being attacked?
Respuesta
  • social engineering
  • attack surface
  • principle of least privilege
  • risk avoidance

Pregunta 25

Pregunta
What is the best way to protect against social engineering?
Respuesta
  • stronger encryption
  • stronger authentication
  • employee awareness
  • risk mitigation

Pregunta 26

Pregunta
What is needed to highly secure a system?
Respuesta
  • lots of time
  • more money
  • system update
  • disabled administrator account

Pregunta 27

Pregunta
What is the first line of defense when setting up a network?
Respuesta
  • physically secure the network
  • configure authentication
  • configure encryption
  • configure an ACL

Pregunta 28

Pregunta
Which concept determines what resources users can access after they log on?
Respuesta
  • authentication
  • auditing
  • access control
  • defense in depth

Pregunta 29

Pregunta
What is used to provide protection when one line of defense is breached?
Respuesta
  • defense in depth
  • attack surface
  • principle of least privilege
  • risk mitigation

Pregunta 30

Pregunta
What is used to identify a person before giving access?
Respuesta
  • authentication
  • encryption
  • access control
  • auditing

Pregunta 31

Pregunta
What is used to verify that an administrator is not accessing data that he should not be accessing?
Respuesta
  • authentication
  • encryption
  • access control
  • auditing

Pregunta 32

Pregunta
What type of device can be easily lost or stolen or can be used for espionage?
Respuesta
  • processors
  • RAM chips
  • removable devices
  • servers

Pregunta 33

Pregunta
What is a physical or logical device used to capture keystrokes?
Respuesta
  • USB flash drive
  • PDA
  • Smartphone
  • keylogger

Pregunta 34

Pregunta
In dealing with risks, which response is done by buying insurance to protect your bottom line if such a disaster or threat is realized?
Respuesta
  • risk avoidance
  • risk acceptance
  • risk mitigation
  • risk transfer

Pregunta 35

Pregunta
What type of device isolates a network by filtering the packets that can enter it?
Respuesta
  • firewall
  • bridge
  • gateway
  • switch

Pregunta 36

Pregunta
What seven-layer model is often used to describe networking technologies and services?
Respuesta
  • OSI
  • TCP/IP
  • IPX/SPX
  • DIX

Pregunta 37

Pregunta
On which OSI layer do routers function?
Respuesta
  • 1
  • 2
  • 3
  • 4

Pregunta 38

Pregunta
On which OSI layer do TCP and UDP function?
Respuesta
  • 1
  • 2
  • 3
  • 4

Pregunta 39

Pregunta
What OSI layer do switches and bridges use?
Respuesta
  • 1
  • 2
  • 3
  • 4

Pregunta 40

Pregunta
What port does SMTP use?
Respuesta
  • 21
  • 23
  • 25
  • 443

Pregunta 41

Pregunta
What port does LDAP use?
Respuesta
  • 25
  • 443
  • 389
  • 3389

Pregunta 42

Pregunta
What type of firewall filters packets based on IP address and ports?
Respuesta
  • packet-filtering
  • circuit-filtering
  • application-level
  • stateful

Pregunta 43

Pregunta
What type of firewall is also known as a proxy server?
Respuesta
  • packet-filtering
  • circuit-filtering
  • application-level
  • stateful

Pregunta 44

Pregunta
What type of firewall looks at the previous conversations to determine if a packet should enter a network?
Respuesta
  • packet-filtering
  • circuit-filtering
  • application-level
  • stateful

Pregunta 45

Pregunta
What Microsoft technology can verify that a client has the newest Windows updates and has an updated antivirus software package before being allowed access to the network?
Respuesta
  • IPSec
  • NAP
  • SCCM
  • SCOM

Pregunta 46

Pregunta
What technology can you use to isolate a network of servers so that they cannot interact with other servers?
Respuesta
  • bridge
  • switch
  • router
  • VLAN

Pregunta 47

Pregunta
What type of device looks at a packet and forwards it based on its destination IP address?
Respuesta
  • bridge
  • switch
  • router
  • VLAN

Pregunta 48

Pregunta
Which type of routing protocol sends the entire routing table to its neighbors?
Respuesta
  • distance vector
  • link state
  • scalable driven
  • infinity

Pregunta 49

Pregunta
Which type of system detects unauthorized intruders and then takes action to stop them from proceeding?
Respuesta
  • IDS
  • IPS
  • VLAN
  • NAT

Pregunta 50

Pregunta
What type of server would you install that would be used to trap a hacker?
Respuesta
  • honeypot
  • NAT
  • IPS
  • IDS

Pregunta 51

Pregunta
What special area serves as a buffer area between the Internet and the internal network and can be used to hold web servers that are accessed from the Internet?
Respuesta
  • DMZ
  • NAT
  • VLAN
  • PLC

Pregunta 52

Pregunta
How many firewalls would you use to create a sandwich DMZ?
Respuesta
  • 1
  • 2
  • 3
  • 4

Pregunta 53

Pregunta
You have several Internet web servers that need to communicate with a SQL server. Where would you place the SQL server?
Respuesta
  • internal network
  • DMZ
  • Internet
  • isolated VLAN

Pregunta 54

Pregunta
Which of the following servers would you not place on the DMZ?
Respuesta
  • Internet web server
  • email relay servers
  • email mailbox servers
  • proxy servers

Pregunta 55

Pregunta
What technology allows a user at home to connect to the corporate network?
Respuesta
  • NAT
  • VPN
  • DMZ
  • PLC

Pregunta 56

Pregunta
Which IPsec protocol provides integrity protection for packet headers, data, and user authentication but does not encrypt the data load?
Respuesta
  • AH
  • ESP
  • IKE
  • LDAP

Pregunta 57

Pregunta
What is the process of identifying an individual?
Respuesta
  • authentication
  • authorization
  • accounting
  • auditing

Pregunta 58

Pregunta
What do you call the process in which a user is identified via a username and password?
Respuesta
  • authentication
  • authorization
  • accounting
  • auditing

Pregunta 59

Pregunta
What is the process of giving individual access to a system or resource?
Respuesta
  • authentication
  • authorization
  • accounting
  • auditing

Pregunta 60

Pregunta
What is the process of keeping track of a user’s activity?
Respuesta
  • authentication
  • authorization
  • accounting
  • authoring

Pregunta 61

Pregunta
What process prevents someone from denying that she accessed a resource?
Respuesta
  • accounting
  • authorization
  • sniffing
  • nonrepudiation

Pregunta 62

Pregunta
Which of the following is a secret numeric password used for authentication?
Respuesta
  • security token
  • digital certificate
  • digital signature
  • PIN

Pregunta 63

Pregunta
What type of electronic document contains a public key?
Respuesta
  • digital certificate
  • biometrics
  • PIN
  • PAN

Pregunta 64

Pregunta
What item, about the size of a credit card, allows access to a network and its resources?
Respuesta
  • digital certificate
  • smart card
  • security token
  • biometric

Pregunta 65

Pregunta
What type of authentication method identifies and recognizes people based on physical traits such as fingerprints?
Respuesta
  • digital certificates
  • WEP
  • biometrics
  • RADIUS

Pregunta 66

Pregunta
What authentication type is the default for Active Directory?
Respuesta
  • NTLM
  • Kerberos
  • MS-CHAP
  • MS-CHAPv2

Pregunta 67

Pregunta
What directory service is used with Windows domains?
Respuesta
  • Active Directory
  • E-Directory
  • PAM
  • Kerberos

Pregunta 68

Pregunta
What type of server runs Active Directory?
Respuesta
  • member server
  • file server
  • domain controller
  • NTLAN server

Pregunta 69

Pregunta
When you access permissions to a folder, you should first grant permissions to __________ rather than users.
Respuesta
  • groups
  • computers
  • collections
  • organizational units

Pregunta 70

Pregunta
When you create a local user on a computer running in Windows 7, where is the user account stored?
Respuesta
  • Active Directory
  • SAM
  • PAN
  • SQL database

Pregunta 71

Pregunta
Which type of group can be granted rights and permissions?
Respuesta
  • security
  • distribution
  • authorizing
  • SAM

Pregunta 72

Pregunta
What authorizes a user to perform certain actions in Windows such as logging on or performing a backup?
Respuesta
  • right
  • permission
  • accessible
  • key

Pregunta 73

Pregunta
When you grant access to print to a printer, what are you granting?
Respuesta
  • right
  • permission
  • accessible
  • key

Pregunta 74

Pregunta
Where are users and permissions stored for an NTFS folder?
Respuesta
  • access log
  • access file
  • registry
  • ACL

Pregunta 75

Pregunta
What type of permissions are assigned directly to a file or folder?
Respuesta
  • explicit
  • inherited
  • encompassing
  • overriding

Pregunta 76

Pregunta
What is the process of converting data into a format that cannot be read by another user?
Respuesta
  • encryption
  • locking
  • keying
  • registering

Pregunta 77

Pregunta
Which authentication sends the username and password in plain text?
Respuesta
  • MS-CHAP
  • CHAP
  • PAP
  • SPAP

Pregunta 78

Pregunta
In Windows, what do you use to enable auditing?
Respuesta
  • registry
  • group policies
  • NTFS permissions
  • access log

Pregunta 79

Pregunta
A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
Respuesta
  • social engineering
  • anonymous keylogging
  • spam
  • DDoS

Pregunta 80

Pregunta
Which two security precautions will help protect a workplace against social engineering? (Choose two.)
Respuesta
  • ensuring that each use of an access card allows access to only one user at the time
  • ensuring that all operating system and antivirus software is up to date
  • encrypting all sensitive data stored on the servers
  • performing daily data backups
  • registering and escorting all visitors to the premises

Pregunta 81

Pregunta
What are two typical physical security precautions that a business can take to protect its computers and systems? (Choose two.)
Respuesta
  • Perform daily data backups.
  • Replace any software firewalls with a hardware firewall.
  • Implement biometric authentication.
  • Ensure that all operating system and antivirus software is up to date.
  • Disable the autorun feature in the operating system.

Pregunta 82

Pregunta
Which physical security technology can hold user authentication information, include software license protection, provide encryption, and provide hardware and software authentication that is specific to the host system?
Respuesta
  • biometric authentication
  • Trusted Platform Module (TPM)
  • card key access
  • two-factor security

Pregunta 83

Pregunta
It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)
Respuesta
  • Set virus protection software to scan removable media when data is accessed.
  • Configure the Windows Firewall to block the ports that are used by viruses.
  • Enable the TPM in the CMOS settings.
  • Repair, delete, or quarantine the infected files.
  • Disable the autorun feature in the operating system.

Pregunta 84

Pregunta
In which situation would a computer technician use the fixmbr command at the command prompt of a Windows XP computer to resolve a security issue?
Respuesta
  • when unauthorized users have changed the CMOS settings and the CMOS password must be reset
  • when a virus has damaged the master boot record of the system disk
  • when a virus has damaged the boot sector of the system disk
  • when the folder permissions for user members of a group are incorrect

Pregunta 85

Pregunta
All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to solve this issue?
Respuesta
  • Set the user folder permissions to Deny.
  • Disable the users’ accounts.
  • Change the user file permissions to Read Only.
  • Enable UAC on the computer.

Pregunta 86

Pregunta
You want to dispose of a 2.5 terabyte hard drive that contains confidential financial information. What is the recommended procedure to achieve this?
Respuesta
  • Use data wiping.
  • Drill through the HDD.
  • Smash the platters with a hammer.
  • Immerse the HDD in a weak solution of bicarbonate of soda.

Pregunta 87

Pregunta
What is the most effective way of securing wireless traffic?
Respuesta
  • WPA2
  • SSID hiding
  • WEP
  • wireless MAC filtering

Pregunta 88

Pregunta
Which two items are used in asymmetric encryption? (Choose two.)
Respuesta
  • a token
  • a TPM
  • a private key
  • a DES key
  • a public key

Pregunta 89

Pregunta
Which two characteristics describe a worm? (Choose two.)
Respuesta
  • hides in a dormant state until needed by an attacker
  • infects computers by attaching to software code
  • executes when software is run on a computer is self-replicating
  • travels to new computers without any intervention or knowledge of the user

Pregunta 90

Pregunta
Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
Respuesta
  • worm
  • phishing
  • adware
  • stealth virus

Pregunta 91

Pregunta
Which three questions should be addressed by organizations developing a security policy? (Choose three.)
Respuesta
  • How should future expansion be done?
  • What are the possible threats to the assets of the organization?
  • What is to be done in the case of a security breach?
  • When do the assets need protecting?
  • What assets require protection?
  • What insurance coverage is required?

Pregunta 92

Pregunta
What does a malware detection program look for when running a scan?
Respuesta
  • a service pack
  • patterns in the programming code of the software on a computer
  • mirror sites
  • patches that prevent a newly discovered virus or worm from making a successful attack

Pregunta 93

Pregunta
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
Respuesta
  • Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.
  • All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
  • All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.
  • Any traffic that comes into port 25 allows outgoing port 113 to be used.

Pregunta 94

Pregunta
Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
Respuesta
  • packet size
  • physical addresses
  • protocols
  • packet speed
  • ports

Pregunta 95

Pregunta
What is the primary goal of a DoS attack?
Respuesta
  • to facilitate access to external networks
  • to prevent the target server from being able to handle additional requests
  • to scan the data on the target server
  • to obtain all addresses in the address book within the server

Pregunta 96

Pregunta
Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?
Respuesta
  • Have you scanned your computer recently for viruses?
  • What symptoms are you experiencing?
  • Did you open any attachments from a suspicious email message?
  • Is your security software up to date?

Pregunta 97

Pregunta
Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?
Respuesta
  • Install rogue antivirus software on the host.
  • Log on to the host as a different user.
  • Disable ActiveX and Silverlight on the host.
  • Disconnect the host from the network.

Pregunta 98

Pregunta
A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?
Respuesta
  • Ensure the security policy is being enforced.
  • Check the computer for the latest OS patches and updates.
  • Scan the computer with protection software.
  • Verify the physical security of all offices.

Pregunta 99

Pregunta
A user has reported that a computer web browser will not display the correct home page even if the default page is reset. What is the likely cause of this problem?
Respuesta
  • A virus has damaged the boot sector of the system disk.
  • The computer has been infected with spyware.
  • UAC has been disabled on the computer.
  • Folder permissions have been changed from Deny to Allow.
Mostrar resumen completo Ocultar resumen completo

Similar

CET_TARDE - Security Fundamentals 2017 - Part 2
Hawerth Castro
CET_TARDE - MTA Software Development Fundamentals 3
Hawerth Castro
CET_TARDE - MTA Software Development Fundamentals 2
Hawerth Castro
CET_TARDE - MTA Software Development Fundamentals 1
Hawerth Castro
CET_TARDE - MTA Software Development Fundamentals 4
Hawerth Castro
CET_TARDE - Security Fundamentals 2017 - Preparing for the certified
Hawerth Castro
Microsoft Azure Fundamentals
Vitor Gerbase
Introdução ao Microsoft Word
Roberto Becker
SALESFORCE ADM-201 Certification Exam 1
Hawerth Castro
SALESFORCE ADM-201 Certification Exam 2
Hawerth Castro
Microsoft Word 2010 - Aulas 05 e 06
Jaqueline Oliveira