Security Fundamentals

Please type your email address (for verification):
Please type your phone number using the international format (use your country code)
Bridging is a process of sending packets from source to destination on OSI Layer 3. Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
Routing
Switching
Repeating
No change is needed
Which enables access to all of the logged-in user's capabilities on a computer?
Java applets
ActiveX controls
Active Server Pages (ASP)
Microsoft Silverlight
A network sniffer is software or hardware that:
Records user activity and transmits it to the server
Captures and analyzes network communication
Protects workstations from intrusions
Catalogs network data to create a secure index
You want to make your computer resistant to online hackers and malicious software. What should you do?
Configure a forward proxy
Install anti-virus software
Enable spam filtering
Turn on Windows Firewall
Which statement is True? 1. FAT32 has built-in security features that control user access. 2. NTFS has built-in security features that control user access. 3. All users on the same FAT32 file system have access rights to all files.
1 and 3
2 and 3
1 and 2
1, 2 and 3
What is a common method for password collection?
Email attachments
Back door intrusions
SQL Injection
Network sniffers
Which provides the highest level of security in a firewall?
Stateful inspection
Outbound packet filters
Stateless inspection
Inbound packet filters
What is a service set identifier (SSID)?
A wireless encryption standard
The wireless LAN transmission type
The broadcast name of an access point
A wireless security protocol
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?
Windows XP Professional Service Pack 3
Windows Vista Enterprise Edition
Windows 7 Enterprise Edition
Windows 2000 Professional Service Pack 4
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?
Windows XP Professional Service Pack 3
Windows Vista Enterprise Edition
Windows 7 Enterprise Edition
Windows 2000 Professional Service Pack 4
Which enables you to change the permissions on a folder?
Take ownership
Take ownership
Auditing
Modify
Setting a minimum password age restricts when users can:
Request a password reset
Change their passwords
Log on by using their passwords
Set their own password expiration
Many Internet sites that you visit require a user name and password. How should you secure these passwords?
Reuse the same password
Enable session caching
Configure the browser to save passwords
Save them to an encrypted file
What is an example of non-propagating malicious code?
Back door
Hoax
Trojan horse
Worm
Which statement is true? 1. There are several built-in basic audit policies and advanced audit policies in Windows. 2. Advanced audit policies applied by a Group Policy are compatible with a basic audit policy. 3. A system access control list (SACL) enables administrators to log attempts to access a secured object.
1 and 3
2 and 3 
1 and 2
No one
A brute force attack:
Uses response filtering
Tries all possible password variations
Uses the strongest possible algorithms
Targets all the ports
Which statement is true? 1. IPSEC requires network applications to be IPsec aware. 2. IPsec encrypts data. 3. IPsec adds overhead for all network communications for which it’s used.
1 and 3
2 and 3
1 and 2
No one
Which password attack uses all possible alpha numeric combinations?
Brute force attack *hydra*
Dictionary attack *hydra*
Hybrid brute force attack *hydra*
Rainbow table attack
Network Access Protection (NAP) enables administrators to control access to network resources based on a computer's:
Encryption level
Warranty
Physical location
Configuration
Role separation improves server security by:
Enforcing principle of least privilege.
Installing applications on separate hard disks.
Physically separating high security servers from other servers.
Placing servers on separate VLANs.
In Internet Explorer 8, the InPrivate Browsing feature prevents:
Unauthorized private data input
Unencrypted communication between the client computer and the server
User credentials from being sent over the Internet
Any session data from being stored on the computer.
Humongous Insurance is an online healthcare insurance company. During an annual security audit a security firm tests the strength of the company's password policy and suggests that Humongous Insurance implements password history policy. What is the likely reason that the security firm suggests this?
Past passwords were easily cracked by the brute force method
Past passwords of users contained dictionary words.
Previous password breaches involved use of past passwords.
Past passwords lacked complexity and special characters.
Your company requires that users type a series of characters to access the wireless network. The series of characters must meet the following requirements: [ul][li]Contains more than 15 characters[/li][li]Contains at least one letter[/li][li]Contains at least one number[/li][li]Contains at least one symbol[/li][/ul]Which security technology meets these requirements?
WEP
WPA2 PSK
WPA2 Enterprise
MAC filtering
Many Internet sites that you visit require a user name and password. How should you secure these passwords?
Save them to a text file
Enable session caching
Configure the browser to save passwords
Save them to an encrypted file
Reuse the same password
Physically securing servers prevents:
Theft
Compromise of the certificate chain
Man-in-the middle attacks
Denial of Service attacks
To prevent users from copying data to removable media, you should:
Lock the computer cases
Apply a group policy
Disable copy and paste
Store media in a locked room
You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an Active Domain. You need to push out an internal certificate to Internet Explorer on all workstations. What is the quickest method to do this?
Local policy
Logon script
Windows Update
Group policy
In Internet Explorer 8, the InPrivate Browsing feature prevents:
Unauthorized private data input
Unencrypted communication between the client computer and the server.
User credentials from being sent over the Internet
Any session data from being stored on the computer
The purpose of a digital certificate is to verify that a:
Public key belongs to a sender
Computer is virus-free
Private key belongs to a sender
Digital document is complete
 
 
A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Decrease the chances of a virus getting to a client machine
Verify that the senders of the messages are legitimate
Ensure that all links in the messages are trustworthy
No change is needed
You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a [u]second administrator account[/u]. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct
Disable unused services
Enable LM authentication
Enable NTLM authentication
No change is needed
A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct
Malware
Spoofed mail
Spam
No change is needed
The client computers on your network are stable and do not need any new features. Which is a benefit of applying operating system updates to these clients?
Keep the software licensed
Keep the server ports available
Update the hardware firewall
Close existing vulnerabilities
A digitally signed e-mail message:
Validates the recipient
Validates the sender
Is encrypted
Is virus-free
Account lockout policies are used to prevent which type of security attack?
Brute force attacks
Users sharing passwords
Social engineering
Passwords being reused immediately
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?
Windows XP Professional Service Pack 3
Windows Vista Enterprise Edition
Windows 7 Enterprise Edition
Windows 2000 Professional Service Pack 4
Which enables you to change the permissions on a folder?
Take ownership
Extended attributes
Auditing
Modify
What are three examples of two-factor authentication? (Choose three.)
A fingerprint and a pattern
A password and a smart card
A username and a password
A password and a pin number
A password and a pin number
You need to limit the programs that can run on client computers to a specific list. Which technology should you implement?
Windows Security Center
Security Accounts Manager
System Configuration Utility
AppLocker group policies
The purpose of User Account Control (UAC) is to:
Encrypt the user's account
Encrypt the user's account
Secure your data from corruption
Secure your data from corruption
What does implementing Windows Server Update Services (WSUS) allow a company to manage?
What does implementing Windows Server Update Services (WSUS) allow a company to manage?
Updates to Group Policy Objects
Active Directory server replication
Active Directory server replication
The purpose of Microsoft Baseline Security Analyzer is to:
List system vulnerabilities
Apply all current patches to a server
Set permissions to a default level
Set permissions to a default level
The Graphic Design Institute hires you to help them set up a server for their 20-person team. As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)
Disable the guest account
Rename the admin account
Remove the account lockout policy
Format partitions with FAT32
What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two)
An image contained in the message
Spelling and grammar errors
Threats of losing service
Use of bold and italics
The Graphic Design Institute hires you to help them set up a server for their 20-person team. As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)
Disable the guest account
Rename the admin account
Remove the account lockout policy
Format partitions with FAT32
What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two)
An image contained in the message
Spelling and grammar errors
Threats of losing service
Use of bold and italics
Before you deploy Network Access Protection (NAP), you must install:
Internet Information Server (IIS)
Network Policy Server (NPS)
Active Directory Federation Services
Windows Update Service
You are trying to connect to an FTP server on the Internet from a computer in a school lab. You cannot get a connection. You try on another computer with the same results. The computers in the lab are able to browse the Internet. You are able to connect to this FTP server from home. What could be blocking the connection to the server?
A layer-2 switch
A wireless access point
A firewall
A layer-2 hub
What does NAT do?
It encrypts and authenticates IP packets
It provides caching and reduces network traffic.
It translates public IP addresses to private addresses and vice versa
It analyzes incoming and outgoing traffic packets.
Which technology enables you to filter communications between a program and the Internet?
RADIUS server
Antivirus software
Software firewall
BitLocker To Go
{"name":"Security Fundamentals", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Please type your email address (for verification):, Please type your phone number using the international format (use your country code), Bridging is a process of sending packets from source to destination on OSI Layer 3. Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.