SecurityFundamentals Part III Q51-75

Description

SecurityFundamentals Part III Q51-75
yacki Dubon
Quiz by yacki Dubon, updated more than 1 year ago
yacki Dubon
Created by yacki Dubon over 6 years ago
6
0

Resource summary

Question 1

Question
Question 51 You are setng up Remote Desktop on your computer. Your computer is a member of a domain. Your frewall confguraton is shown in the following image. You need to allow Remote Desktop to be able to get through your frewall for users on your company's network. Which setngs should you enable?
Answer
  • A. Remote Assistance: Home:Work (Private
  • B.Remote Desktop: Public
  • C.Remote Desktop: Home:Work (Private)
  • D.Remote Assistance: Domain

Question 2

Question
Question 52 You are trying to connect to an FTP server on the Internet from a computer in a school lab. You cannot get a connecton. You try on another computer with the same results. The computers in the lab are able to browse the Internet. You are able to connect to this FTP server from home. What could be blocking the connecton to the server?
Answer
  • A. A layer-2 switch
  • B.A wireless access point
  • C.A frewall
  • D.A layer-2 hub

Question 3

Question
Question 53 What does NAT do?
Answer
  • A. It encrypts and authentcates IP packets.
  • B.It provides caching and reduces network trafc.
  • C.It translates public IP addresses to private addresses and vice versa.
  • D.It analyzes incoming and outgoing trafc packets.

Question 4

Question
Question 54 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. Smart cards can be used in biometrics based systems [blank_start]YES[blank_end] Smartcard cards can be read from distances of several inches to many yards [blank_start]NO[blank_end] Smart cards provide a means of securely storing data on the card [blank_start]YES[blank_end]
Answer
  • YES
  • NO
  • YES

Question 5

Question
Question 55 The default password length for a Windows Server domain controller is:
Answer
  • 0
  • 5
  • 7
  • 14

Question 6

Question
Question 56 HOTSPOT Your supervisor asks you to review fle permission setngs on the applicaton.bat fle. You need to report which fle system the fle is on and the type of permission the fle has. You review the applicaton Propertes dialog box shown in the following image. Use the drop-down menus to select the answer choice that completes each statement. Each correct selecton is worth one point. 1-The "cygwin.bat" file in the image is currently on the _________ file system. 2- ___________permissions are currently being displayed for the "cygwin.bat" file.
Answer
  • FAT16
  • FAT32
  • NTFS
  • Basic
  • Advanced
  • Full control

Question 7

Question
Question 57 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. There are several built-in basic audit policies and advances audit polices in Windows [blank_start]YES[blank_end] Advanced audit policies applied by a Group Policy are compatible with a basic audit policy. [blank_start]NO[blank_end] A system access control list (SACL) enables administrators to log attempts to access a secure object [blank_start]YES[blank_end]
Answer
  • YES
  • NO
  • N
  • Y
  • Affirmative
  • Nega

Question 8

Question
Question 58 You create a web server for your school. When users visit your site, they get a certfcate error that says your site is not trusted. What should you do to fx this problem?
Answer
  • A. Install a certfcate from a trusted Certfcate Authority (CA).
  • B.Use a digital signature.
  • C.Generate a certfcate request.
  • D.Enable Public Keys on your website.

Question 9

Question
Question 59 What is an example of non-propagatng malicious code?
Answer
  • A. A back door
  • B.A hoax
  • C.A Trojan horse
  • D.A worm

Question 10

Question
Question 60 A brute force atack:
Answer
  • A. Uses response fltering
  • B.Tries all possible password variatons
  • C.Uses the strongest possible algorithms
  • D.Targets all the ports

Question 11

Question
Question 61 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. FAT32 has built-in security features that control user access [blank_start]NO[blank_end] NTFS has built-in security features that control file access [blank_start]YES[blank_end] All users on the same FAT32 file system have access rights to all files [blank_start]YES[blank_end]
Answer
  • NO
  • YES
  • YES

Question 12

Question
Question 62 Humongous Insurance is an online healthcare insurance company. During an annual security audit a security frm tests the strength of the company's password policy and suggests that Humongous Insurance implement password history policy. What is the likely reason that the security frm suggests this?
Answer
  • A. Past passwords were easily cracked by the brute force method.
  • B.Past passwords of users contained dictonary words.
  • C.Previous password breaches involved use of past passwords.
  • D.Past passwords lacked complexity and special characters.

Question 13

Question
Question 63 The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and saltng it with the WPS PIN. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Answer
  • A. Service Set Identfer (SSID)
  • B.Admin password
  • C.WEP key
  • D.No change is needed

Question 14

Question
Question 64 What are three major atack vectors that a social engineering hacker may use? (Choose three.)
Answer
  • A. Telephone
  • B.Reverse social engineering
  • C.Waste management
  • D.Honey pot systems
  • E.Firewall interface

Question 15

Question
Question 65 Which two security setngs can be controlled by using group policy? (Choose two.)
Answer
  • A. Password complexity
  • B.Access to the Run... command
  • C.Automatc fle locking
  • D.Encrypted access from a smart phone

Question 16

Question
Question 66 Cookies impact security by enabling: (Choose two.)
Answer
  • A. Storage of Web site passwords.
  • B.Higher security Web site protectons.
  • C.Secure Sockets Layer (SSL).
  • D.Web sites to track browsing habits.

Question 17

Question
Question 67 To keep third-party content providers from tracking your movements on the web, enable InPrivate Browsing. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.
Answer
  • A. InPrivate Filtering
  • B.SmartScreen Filter
  • C.Compatbility Mode
  • D.No change is needed

Question 18

Question
Question 68 Which enables access to all of the logged-in user's capabilites on a computer?
Answer
  • A. Java applets
  • B.ActveX controls
  • C.Actve Server Pages (ASP)
  • D.Microsof Silverlight

Question 19

Question
Question 69 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point. Bitlocker to Go Reader allows you to encrypt drives [blank_start]NO[blank_end] BitLocker to Go Reader requires drives that are encrypted using a password [blank_start]YES[blank_end] BitLocker to Go works on Windows Vista and Windows XP [blank_start]YES[blank_end]
Answer
  • NO
  • YES
  • YES

Question 20

Question
Question 70 You need to install a domain controller in a branch ofce. You also need to secure the informaton on the domain controller. You will be unable to physically secure the server. Which should you implement?
Answer
  • A. Read-Only Domain Controller
  • B.Point-to-Point Tunneling Protocol (PPTP)
  • C.Layer 2 Tunneling Protocol (L2TP)
  • D.Server Core Domain Controller

Question 21

Question
Question 71 E-mail spoofng:
Answer
  • A. Forwards e-mail messages to all contacts
  • B.Copies e-mail messages sent from a specifc user
  • C.Obscures the true e-mail sender
  • D.Modifes e-mail routng logs

Question 22

Question
Question 72 What is the primary advantage of using Actve Directory Integrated Zones?
Answer
  • A. Zone encrypton
  • B.Password protecton
  • C.Non-repudiaton
  • D.Secure replicaton

Question 23

Question
Question 73 Which two are included in an enterprise antvirus program? (Choose two.)
Answer
  • A. Atack surface scanning
  • B.On-demand scanning
  • C.Packet scanning
  • D.Scheduled scanning

Question 24

Question
Question 74 Phishing is an atempt to:
Answer
  • A. Obtain informaton by posing as a trustworthy entty.
  • B.Limit access to e-mail systems by authorized users.
  • C.Steal data through the use of network intrusion.
  • D.Corrupt e-mail databases through the use of viruses.

Question 25

Question
Question 75 Humongous Insurance needs to set up a domain controller in a branch ofce. Unfortunately, the server cannot be sufciently secured from access by employees in that ofce, so the company is installing a Primary Domain Controller. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Answer
  • A. Read-Only Domain Controller
  • B.Backup Domain Controller
  • C.Actve Directory Server
  • D.No change is needed.
Show full summary Hide full summary

Similar

Diapositivas de Topología de Redes
lisi_98
Fase 5. Evaluar. Sustentar el diseño de modelo de propagación. MAPA DE RFID
Miller Suárez López
TEORIA DESCRIPCION DE LA FORMA
Stiven Ramirez
Construcción de software
CRHISTIAN SUAREZ
FUNCIONES MULTIVARIABLES
Jarumy cecilia Sánchez Hernández
Proceso de Simulación
Jesus Javier
Dibujo de ingeniería
Felipe Granada
Competencias Laborales de un Ingeniero en Diseño de Entretenimiento Digital
Daniel Giraldo
Modelos de Gestión de Inventarios en Cadenas de Abastecimiento
Rubén Darío Martínez Lira
Mapa conceptual "Vientos"
Muñoz Rey Antonio
Ingenieria Social
Diego Gutierrez