65231 Flashcards
You should complete all of the following steps to protect against war-driving attacks —
Change the default SSID Disable SSID broadcast. Configure the network to use authenticated access only. Configure the WEP protocol to WPA. Implement WPA2 instead of WEP. Reduce the access point signal strength.
War driving is a method of discovering 802.11 wireless networks by driving around with a laptop and looking for —
open wireless networks.
NetStumbler is a common —
war-driving tool.
Hardware tokens, server locks, and door locks are security concepts considered___________________ If they are the sole method of user authentication, safeguards must be put in place to ensure security should they are______________. They are best implemented as part of a__________________________. —
something you have / lost or stolen / multifactor authentication system
Hardware tokens are some type of _____________________that a user must have during the login process to prove possession of the device. —
physical object
Door locks require a key which is ___________________to open, whether the key is a typical metal key, a keypad, a smart card, or a key fob. —
something you have
Server locks _______________________to the devices in the server cabinet. They can be locked through a key in the same manner that door locks can be secured. Electronic locks could require a security card or hardware token to open. —
restrict access
Biometric devices are based on the security concept _______________________They match a user’s uniquely identifiable physical attribute to a previously stored value. —
something you are
Automated System Recovery in not an option listed in the —
Advanced Boot Options menu.\
The menu for Advanced Boot Options —
Safe Mode Safe Mode with Networking Safe Mode with Command Prompt Enable Boot Logging Enable low-resolution video -640-480 Last Known Good Configuration Directory Services Restore Mode Debugging Mode. Disable automatic restart on system failure Disable Drive Signature Enforcement
The bootmgr file replaced the —
NTLDR file. The NTLDR was the boot loader for Windows XP and earlier. In Windows Vista and later, NTLDR was replaced by the bootmgr.exe and winload.exe files.
The _________________________file is the file that replaced the boot.ini file. —
Boot Configuration Data BCD
The boot.ini file was used in Windows XP and earlier, and the BCD file was used in —
Windows Vista and later.
The BCD holds configuration data about which ________________________are installed. —
operating systems
You cannot copy a BCD file from another computer and expect it to work properly. The MSCONFIG utility is used to edit the —
BCD file.