CET_TARDE - Security Fundamentals 2017 - Preparing for the certified

Descrição

Security Fundamentals Quizzes - Preparing for the certificate
Hawerth Castro
Quiz por Hawerth Castro, atualizado more than 1 year ago
Hawerth Castro
Criado por Hawerth Castro mais de 7 anos atrás
366
0

Resumo de Recurso

Questão 1

Questão
Which of the following is the method used to gain access to data, systems, or networks, primarily through misrepresentation and relies on the trusting nature of the person being attacked?
Responda
  • Non-Repudiation
  • Attack Surface
  • IPAM
  • Social Engineering

Questão 2

Questão
True or False: Biometrics are a good way to secure certain areas of a building.
Responda
  • True
  • False

Questão 3

Questão
Which of the following are very common social engineering tactics?
Responda
  • Email
  • Port Sniffing
  • Watching someone type a password
  • Calling and asking a user for their credentials
  • Impersonation

Questão 4

Questão
True or False: A laptop cannot be secured to a desk or workspace in a convenient manner.
Responda
  • True
  • False

Questão 5

Questão
What type of Windows Server is responsible for storing, accessing and managing an Active Directory implementation?
Responda
  • DHCP
  • Print Server
  • File Server
  • Workstation
  • Domain Controller

Questão 6

Questão
Which of the following is the process of tracking users who have logged in and what those user have accessed or tried to access?
Responda
  • Auditing
  • Active Directory
  • Encryption
  • Non-Repudiation
  • RADIUS

Questão 7

Questão
What is Microsoft’s technology for centrally tracking and managing users and information about them?
Responda
  • Active Directory
  • RADIUS
  • Point-to-Point Tunneling Protocol
  • NFS
  • NDS

Questão 8

Questão
True or False: PGP is the encryption technology used to secure websites on the internet.
Responda
  • True
  • False

Questão 9

Questão
What is the process of identifying an individual, usually based on a username and password?
Responda
  • Auditing
  • Authentication
  • Authorization
  • Encryption

Questão 10

Questão
Which of the following is a valid network troubleshooting tool that can be used by someone trying to steal data or logon credentials from a network?
Responda
  • nslookup
  • DNS
  • Wire Tester
  • Network Sniffer

Questão 11

Questão
Which of the following is a crude type of attack that attempts to compromise a password by trying all possible combinations of permitted character types?
Responda
  • Social Engineering
  • Dictionary Attack
  • Man-in-the-Middle
  • Brute Force Attac
  • Denial-of-Service (DoS)

Questão 12

Questão
Microsoft provides which of the following as a password policy option to prevent password attacks from being effective?
Responda
  • SSL
  • Physical Security
  • DHCP
  • Smart Cards
  • Account Lockout

Questão 13

Questão
True or False: Password attacks are a very common way for attackers to attempt to compromise a computer or network.
Responda
  • True
  • False

Questão 14

Questão
The shortest possible amount of time that a user is required to use the same password per a password policy is known as?
Responda
  • Non-Repudiation
  • Encryption
  • Password History
  • Minimum Password Age
  • Complex Password

Questão 15

Questão
This can be used to serve as a buffer between to networks and provide isolation to certain network services:
Responda
  • Firewall
  • Server
  • Perimeter Network
  • Router
  • Organizational Unit

Questão 16

Questão
True or False: Firewalls operate at layer 6 of the OSI model.
Responda
  • True
  • False

Questão 17

Questão
True or False: A honeypot is an effective deterrent to hackers successfully compromising your network.
Responda
  • True
  • False

Questão 18

Questão
Which of the following are protocols commonly used in VPN implementations? (Choose four)
Responda
  • Secure Sockets Layer (SSL)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Secure Socket Tunneling Protocol (SSTP)
  • Hypertext Transfer Protocol (HTTP)
  • IPSec

Questão 19

Questão
Which of the following is a method used to analyze the health of computers attempting to connect to the network and allow or deny access to the network based on the results?
Responda
  • VPN
  • BitLocker
  • DNS
  • Network Access Protection (NAP)
  • IMAP

Questão 20

Questão
True or False: The windows firewall can be centrally managed using group policy.
Responda
  • True
  • False

Questão 21

Questão
When a user receives an email or sees a pop-up windows warning them of a virus infection and either asks them to forward the warning on or provides a link to download software to remove the threat it is know as a:
Responda
  • Adware
  • Rootkit
  • Virus Hoax
  • Trojan Horse
  • Social Engineering Attack

Questão 22

Questão
Which of the following features of Internet Explorer can assist an administrator or user in securing the browsing experience?
Responda
  • Pop-Up Blocker
  • Start Page
  • Cookies and Privacy Settings
  • Content Zones
  • Temporary Internet Files

Questão 23

Questão
True or False: Malware is software designed to infiltrate or affect a computer system without the owner’s informed consent.
Responda
  • True
  • False

Questão 24

Questão
True or False: Microsoft provides an anti-malware/anti-virus package for windows
Responda
  • True
  • False

Semelhante

QUESTIONÁRIO DE INFORMÁTICA: SISTEMAS OPERACIONAIS
anapaulabrasilam
WINDOWS PHONE - IOS
Ricardo Augusto5798
CET_TARDE - Security Fundamentals 2017 - Part 2
Hawerth Castro
Windows 10
Ricardo Berti
CET_TARDE - Security Fundamentals 2017 - Part 1
Hawerth Castro
CET_TARDE - MTA Database - STANDARDS
Hawerth Castro
CET_TARDE - Security Fundamentals 2017 - Part 3
Hawerth Castro
Introdução ao Microsoft Word
Roberto Becker
Flashcards noções de informática para concurso
OSVALDO TUON
SALESFORCE ADM-201 Certification Exam 1
Hawerth Castro
Avaliação Teórica - Sistemas Operacionais
niltonoliveira