CET_TARDE - Security Fundamentals 2017 - Preparing for the certified

Description

Security Fundamentals Quizzes - Preparing for the certificate
Hawerth Castro
Quiz by Hawerth Castro, updated more than 1 year ago
Hawerth Castro
Created by Hawerth Castro over 7 years ago
366
0

Resource summary

Question 1

Question
Which of the following is the method used to gain access to data, systems, or networks, primarily through misrepresentation and relies on the trusting nature of the person being attacked?
Answer
  • Non-Repudiation
  • Attack Surface
  • IPAM
  • Social Engineering

Question 2

Question
True or False: Biometrics are a good way to secure certain areas of a building.
Answer
  • True
  • False

Question 3

Question
Which of the following are very common social engineering tactics?
Answer
  • Email
  • Port Sniffing
  • Watching someone type a password
  • Calling and asking a user for their credentials
  • Impersonation

Question 4

Question
True or False: A laptop cannot be secured to a desk or workspace in a convenient manner.
Answer
  • True
  • False

Question 5

Question
What type of Windows Server is responsible for storing, accessing and managing an Active Directory implementation?
Answer
  • DHCP
  • Print Server
  • File Server
  • Workstation
  • Domain Controller

Question 6

Question
Which of the following is the process of tracking users who have logged in and what those user have accessed or tried to access?
Answer
  • Auditing
  • Active Directory
  • Encryption
  • Non-Repudiation
  • RADIUS

Question 7

Question
What is Microsoft’s technology for centrally tracking and managing users and information about them?
Answer
  • Active Directory
  • RADIUS
  • Point-to-Point Tunneling Protocol
  • NFS
  • NDS

Question 8

Question
True or False: PGP is the encryption technology used to secure websites on the internet.
Answer
  • True
  • False

Question 9

Question
What is the process of identifying an individual, usually based on a username and password?
Answer
  • Auditing
  • Authentication
  • Authorization
  • Encryption

Question 10

Question
Which of the following is a valid network troubleshooting tool that can be used by someone trying to steal data or logon credentials from a network?
Answer
  • nslookup
  • DNS
  • Wire Tester
  • Network Sniffer

Question 11

Question
Which of the following is a crude type of attack that attempts to compromise a password by trying all possible combinations of permitted character types?
Answer
  • Social Engineering
  • Dictionary Attack
  • Man-in-the-Middle
  • Brute Force Attac
  • Denial-of-Service (DoS)

Question 12

Question
Microsoft provides which of the following as a password policy option to prevent password attacks from being effective?
Answer
  • SSL
  • Physical Security
  • DHCP
  • Smart Cards
  • Account Lockout

Question 13

Question
True or False: Password attacks are a very common way for attackers to attempt to compromise a computer or network.
Answer
  • True
  • False

Question 14

Question
The shortest possible amount of time that a user is required to use the same password per a password policy is known as?
Answer
  • Non-Repudiation
  • Encryption
  • Password History
  • Minimum Password Age
  • Complex Password

Question 15

Question
This can be used to serve as a buffer between to networks and provide isolation to certain network services:
Answer
  • Firewall
  • Server
  • Perimeter Network
  • Router
  • Organizational Unit

Question 16

Question
True or False: Firewalls operate at layer 6 of the OSI model.
Answer
  • True
  • False

Question 17

Question
True or False: A honeypot is an effective deterrent to hackers successfully compromising your network.
Answer
  • True
  • False

Question 18

Question
Which of the following are protocols commonly used in VPN implementations? (Choose four)
Answer
  • Secure Sockets Layer (SSL)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Secure Socket Tunneling Protocol (SSTP)
  • Hypertext Transfer Protocol (HTTP)
  • IPSec

Question 19

Question
Which of the following is a method used to analyze the health of computers attempting to connect to the network and allow or deny access to the network based on the results?
Answer
  • VPN
  • BitLocker
  • DNS
  • Network Access Protection (NAP)
  • IMAP

Question 20

Question
True or False: The windows firewall can be centrally managed using group policy.
Answer
  • True
  • False

Question 21

Question
When a user receives an email or sees a pop-up windows warning them of a virus infection and either asks them to forward the warning on or provides a link to download software to remove the threat it is know as a:
Answer
  • Adware
  • Rootkit
  • Virus Hoax
  • Trojan Horse
  • Social Engineering Attack

Question 22

Question
Which of the following features of Internet Explorer can assist an administrator or user in securing the browsing experience?
Answer
  • Pop-Up Blocker
  • Start Page
  • Cookies and Privacy Settings
  • Content Zones
  • Temporary Internet Files

Question 23

Question
True or False: Malware is software designed to infiltrate or affect a computer system without the owner’s informed consent.
Answer
  • True
  • False

Question 24

Question
True or False: Microsoft provides an anti-malware/anti-virus package for windows
Answer
  • True
  • False
Show full summary Hide full summary

Similar

QUESTIONÁRIO DE INFORMÁTICA: SISTEMAS OPERACIONAIS
anapaulabrasilam
WINDOWS PHONE - IOS
Ricardo Augusto5798
CET_TARDE - Security Fundamentals 2017 - Part 2
Hawerth Castro
Windows 10
Ricardo Berti
CET_TARDE - Security Fundamentals 2017 - Part 1
Hawerth Castro
CET_TARDE - MTA Database - STANDARDS
Hawerth Castro
CET_TARDE - Security Fundamentals 2017 - Part 3
Hawerth Castro
Introdução ao Microsoft Word
Roberto Becker
Flashcards noções de informática para concurso
OSVALDO TUON
SALESFORCE ADM-201 Certification Exam 1
Hawerth Castro
Avaliação Teórica - Sistemas Operacionais
niltonoliveira