CET_TARDE - Security Fundamentals 2017 - Preparing for the certified

Descripción

Security Fundamentals Quizzes - Preparing for the certificate
Hawerth Castro
Test por Hawerth Castro, actualizado hace más de 1 año
Hawerth Castro
Creado por Hawerth Castro hace más de 7 años
366
0

Resumen del Recurso

Pregunta 1

Pregunta
Which of the following is the method used to gain access to data, systems, or networks, primarily through misrepresentation and relies on the trusting nature of the person being attacked?
Respuesta
  • Non-Repudiation
  • Attack Surface
  • IPAM
  • Social Engineering

Pregunta 2

Pregunta
True or False: Biometrics are a good way to secure certain areas of a building.
Respuesta
  • True
  • False

Pregunta 3

Pregunta
Which of the following are very common social engineering tactics?
Respuesta
  • Email
  • Port Sniffing
  • Watching someone type a password
  • Calling and asking a user for their credentials
  • Impersonation

Pregunta 4

Pregunta
True or False: A laptop cannot be secured to a desk or workspace in a convenient manner.
Respuesta
  • True
  • False

Pregunta 5

Pregunta
What type of Windows Server is responsible for storing, accessing and managing an Active Directory implementation?
Respuesta
  • DHCP
  • Print Server
  • File Server
  • Workstation
  • Domain Controller

Pregunta 6

Pregunta
Which of the following is the process of tracking users who have logged in and what those user have accessed or tried to access?
Respuesta
  • Auditing
  • Active Directory
  • Encryption
  • Non-Repudiation
  • RADIUS

Pregunta 7

Pregunta
What is Microsoft’s technology for centrally tracking and managing users and information about them?
Respuesta
  • Active Directory
  • RADIUS
  • Point-to-Point Tunneling Protocol
  • NFS
  • NDS

Pregunta 8

Pregunta
True or False: PGP is the encryption technology used to secure websites on the internet.
Respuesta
  • True
  • False

Pregunta 9

Pregunta
What is the process of identifying an individual, usually based on a username and password?
Respuesta
  • Auditing
  • Authentication
  • Authorization
  • Encryption

Pregunta 10

Pregunta
Which of the following is a valid network troubleshooting tool that can be used by someone trying to steal data or logon credentials from a network?
Respuesta
  • nslookup
  • DNS
  • Wire Tester
  • Network Sniffer

Pregunta 11

Pregunta
Which of the following is a crude type of attack that attempts to compromise a password by trying all possible combinations of permitted character types?
Respuesta
  • Social Engineering
  • Dictionary Attack
  • Man-in-the-Middle
  • Brute Force Attac
  • Denial-of-Service (DoS)

Pregunta 12

Pregunta
Microsoft provides which of the following as a password policy option to prevent password attacks from being effective?
Respuesta
  • SSL
  • Physical Security
  • DHCP
  • Smart Cards
  • Account Lockout

Pregunta 13

Pregunta
True or False: Password attacks are a very common way for attackers to attempt to compromise a computer or network.
Respuesta
  • True
  • False

Pregunta 14

Pregunta
The shortest possible amount of time that a user is required to use the same password per a password policy is known as?
Respuesta
  • Non-Repudiation
  • Encryption
  • Password History
  • Minimum Password Age
  • Complex Password

Pregunta 15

Pregunta
This can be used to serve as a buffer between to networks and provide isolation to certain network services:
Respuesta
  • Firewall
  • Server
  • Perimeter Network
  • Router
  • Organizational Unit

Pregunta 16

Pregunta
True or False: Firewalls operate at layer 6 of the OSI model.
Respuesta
  • True
  • False

Pregunta 17

Pregunta
True or False: A honeypot is an effective deterrent to hackers successfully compromising your network.
Respuesta
  • True
  • False

Pregunta 18

Pregunta
Which of the following are protocols commonly used in VPN implementations? (Choose four)
Respuesta
  • Secure Sockets Layer (SSL)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Secure Socket Tunneling Protocol (SSTP)
  • Hypertext Transfer Protocol (HTTP)
  • IPSec

Pregunta 19

Pregunta
Which of the following is a method used to analyze the health of computers attempting to connect to the network and allow or deny access to the network based on the results?
Respuesta
  • VPN
  • BitLocker
  • DNS
  • Network Access Protection (NAP)
  • IMAP

Pregunta 20

Pregunta
True or False: The windows firewall can be centrally managed using group policy.
Respuesta
  • True
  • False

Pregunta 21

Pregunta
When a user receives an email or sees a pop-up windows warning them of a virus infection and either asks them to forward the warning on or provides a link to download software to remove the threat it is know as a:
Respuesta
  • Adware
  • Rootkit
  • Virus Hoax
  • Trojan Horse
  • Social Engineering Attack

Pregunta 22

Pregunta
Which of the following features of Internet Explorer can assist an administrator or user in securing the browsing experience?
Respuesta
  • Pop-Up Blocker
  • Start Page
  • Cookies and Privacy Settings
  • Content Zones
  • Temporary Internet Files

Pregunta 23

Pregunta
True or False: Malware is software designed to infiltrate or affect a computer system without the owner’s informed consent.
Respuesta
  • True
  • False

Pregunta 24

Pregunta
True or False: Microsoft provides an anti-malware/anti-virus package for windows
Respuesta
  • True
  • False
Mostrar resumen completo Ocultar resumen completo

Similar

QUESTIONÁRIO DE INFORMÁTICA: SISTEMAS OPERACIONAIS
anapaulabrasilam
WINDOWS PHONE - IOS
Ricardo Augusto5798
CET_TARDE - Security Fundamentals 2017 - Part 2
Hawerth Castro
Windows 10
Ricardo Berti
CET_TARDE - Security Fundamentals 2017 - Part 1
Hawerth Castro
CET_TARDE - MTA Database - STANDARDS
Hawerth Castro
CET_TARDE - Security Fundamentals 2017 - Part 3
Hawerth Castro
Introdução ao Microsoft Word
Roberto Becker
Flashcards noções de informática para concurso
OSVALDO TUON
SALESFORCE ADM-201 Certification Exam 1
Hawerth Castro
Avaliação Teórica - Sistemas Operacionais
niltonoliveira