Question 1
Question
Question 51
You are setng up Remote Desktop on your computer. Your computer is a member of a domain.
Your frewall confguraton is shown in the following image.
You need to allow Remote Desktop to be able to get through your frewall for users on your company's network. Which setngs should you enable?
Answer
-
A. Remote Assistance: Home:Work (Private
-
B.Remote Desktop: Public
-
C.Remote Desktop: Home:Work (Private)
-
D.Remote Assistance: Domain
Question 2
Question
Question 52
You are trying to connect to an FTP server on the Internet from a computer in a school lab. You cannot get a connecton. You try on another computer with the same results. The computers in the lab are able to browse the
Internet.
You are able to connect to this FTP server from home.
What could be blocking the connecton to the server?
Question 3
Question
Question 53
What does NAT do?
Answer
-
A. It encrypts and authentcates IP packets.
-
B.It provides caching and reduces network trafc.
-
C.It translates public IP addresses to private addresses and vice versa.
-
D.It analyzes incoming and outgoing trafc packets.
Question 4
Question
Question 54
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point.
Smart cards can be used in biometrics based systems [blank_start]YES[blank_end]
Smartcard cards can be read from distances of several inches to many yards [blank_start]NO[blank_end]
Smart cards provide a means of securely storing data on the card [blank_start]YES[blank_end]
Question 5
Question
Question 55
The default password length for a Windows Server domain controller is:
Question 6
Question
Question 56
HOTSPOT
Your supervisor asks you to review fle permission setngs on the applicaton.bat fle.
You need to report which fle system the fle is on and the type of permission the fle has.
You review the applicaton Propertes dialog box shown in the following image.
Use the drop-down menus to select the answer choice that completes each statement. Each correct selecton is worth
one point.
1-The "cygwin.bat" file in the image is currently on the _________ file system.
2- ___________permissions are currently being displayed for the "cygwin.bat" file.
Answer
-
FAT16
-
FAT32
-
NTFS
-
Basic
-
Advanced
-
Full control
Question 7
Question
Question 57
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point.
There are several built-in basic audit policies and advances audit polices in Windows [blank_start]YES[blank_end]
Advanced audit policies applied by a Group Policy are compatible with a basic audit policy. [blank_start]NO[blank_end]
A system access control list (SACL) enables administrators to log attempts to access a secure object [blank_start]YES[blank_end]
Answer
-
YES
-
NO
-
N
-
Y
-
Affirmative
-
Nega
Question 8
Question
Question 58
You create a web server for your school. When users visit your site, they get a certfcate error that says your site is not
trusted.
What should you do to fx this problem?
Answer
-
A. Install a certfcate from a trusted Certfcate Authority (CA).
-
B.Use a digital signature.
-
C.Generate a certfcate request.
-
D.Enable Public Keys on your website.
Question 9
Question
Question 59
What is an example of non-propagatng malicious code?
Answer
-
A. A back door
-
B.A hoax
-
C.A Trojan horse
-
D.A worm
Question 10
Question
Question 60
A brute force atack:
Answer
-
A. Uses response fltering
-
B.Tries all possible password variatons
-
C.Uses the strongest possible algorithms
-
D.Targets all the ports
Question 11
Question
Question 61
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point.
FAT32 has built-in security features that control user access [blank_start]NO[blank_end]
NTFS has built-in security features that control file access [blank_start]YES[blank_end]
All users on the same FAT32 file system have access rights to all files [blank_start]YES[blank_end]
Question 12
Question
Question 62
Humongous Insurance is an online healthcare insurance company. During an annual security audit a security frm tests
the strength of the company's password policy and suggests that Humongous Insurance implement password history
policy.
What is the likely reason that the security frm suggests this?
Answer
-
A. Past passwords were easily cracked by the brute force method.
-
B.Past passwords of users contained dictonary words.
-
C.Previous password breaches involved use of past passwords.
-
D.Past passwords lacked complexity and special characters.
Question 13
Question
Question 63
The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and saltng it with the WPS PIN.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if
the underlined text makes the statement correct.
Question 14
Question
Question 64
What are three major atack vectors that a social engineering hacker may use? (Choose three.)
Question 15
Question
Question 65
Which two security setngs can be controlled by using group policy? (Choose two.)
Question 16
Question
Question 66
Cookies impact security by enabling: (Choose two.)
Answer
-
A. Storage of Web site passwords.
-
B.Higher security Web site protectons.
-
C.Secure Sockets Layer (SSL).
-
D.Web sites to track browsing habits.
Question 17
Question
Question 67
To keep third-party content providers from tracking your movements on the web, enable InPrivate Browsing.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if
the underlined text makes the statement correct.
Answer
-
A. InPrivate Filtering
-
B.SmartScreen Filter
-
C.Compatbility Mode
-
D.No change is needed
Question 18
Question
Question 68
Which enables access to all of the logged-in user's capabilites on a computer?
Question 19
Question
Question 69
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selecton is worth one point.
Bitlocker to Go Reader allows you to encrypt drives [blank_start]NO[blank_end]
BitLocker to Go Reader requires drives that are encrypted using a password [blank_start]YES[blank_end]
BitLocker to Go works on Windows Vista and Windows XP [blank_start]YES[blank_end]
Question 20
Question
Question 70
You need to install a domain controller in a branch ofce. You also need to secure the informaton on the domain
controller. You will be unable to physically secure the server.
Which should you implement?
Answer
-
A. Read-Only Domain Controller
-
B.Point-to-Point Tunneling Protocol (PPTP)
-
C.Layer 2 Tunneling Protocol (L2TP)
-
D.Server Core Domain Controller
Question 21
Question
Question 71
E-mail spoofng:
Answer
-
A. Forwards e-mail messages to all contacts
-
B.Copies e-mail messages sent from a specifc user
-
C.Obscures the true e-mail sender
-
D.Modifes e-mail routng logs
Question 22
Question
Question 72
What is the primary advantage of using Actve Directory Integrated Zones?
Answer
-
A. Zone encrypton
-
B.Password protecton
-
C.Non-repudiaton
-
D.Secure replicaton
Question 23
Question
Question 73
Which two are included in an enterprise antvirus program? (Choose two.)
Question 24
Question
Question 74
Phishing is an atempt to:
Answer
-
A. Obtain informaton by posing as a trustworthy entty.
-
B.Limit access to e-mail systems by authorized users.
-
C.Steal data through the use of network intrusion.
-
D.Corrupt e-mail databases through the use of viruses.
Question 25
Question
Question 75
Humongous Insurance needs to set up a domain controller in a branch ofce. Unfortunately, the server cannot be
sufciently secured from access by employees in that ofce, so the company is installing a Primary Domain Controller.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if
the underlined text makes the statement correct.