65231 Flashcards

1
Q

You should complete all of the following steps to protect against war-driving attacks —

A
Change the default SSID    
Disable SSID broadcast.    
Configure the network to use authenticated access only.    
Configure the WEP protocol to WPA.    
Implement WPA2 instead of WEP.   
Reduce the access point signal strength.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

War driving is a method of discovering 802.11 wireless networks by driving around with a laptop and looking for —

A

open wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NetStumbler is a common —

A

war-driving tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware tokens, server locks, and door locks are security concepts considered___________________ If they are the sole method of user authentication, safeguards must be put in place to ensure security should they are______________. They are best implemented as part of a__________________________. —

A

something you have / lost or stolen / multifactor authentication system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware tokens are some type of _____________________that a user must have during the login process to prove possession of the device. —

A

physical object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Door locks require a key which is ___________________to open, whether the key is a typical metal key, a keypad, a smart card, or a key fob. —

A

something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Server locks _______________________to the devices in the server cabinet. They can be locked through a key in the same manner that door locks can be secured. Electronic locks could require a security card or hardware token to open. —

A

restrict access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biometric devices are based on the security concept _______________________They match a user’s uniquely identifiable physical attribute to a previously stored value. —

A

something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Automated System Recovery in not an option listed in the —

A

Advanced Boot Options menu.\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The menu for Advanced Boot Options —

A
Safe Mode     
Safe Mode with Networking    
Safe Mode with Command Prompt     
Enable Boot Logging     
Enable low-resolution video -640-480     
Last Known Good Configuration      
Directory Services Restore Mode     
Debugging Mode.     
Disable automatic restart on system failure      
Disable Drive Signature Enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The bootmgr file replaced the —

A

NTLDR file. The NTLDR was the boot loader for Windows XP and earlier. In Windows Vista and later, NTLDR was replaced by the bootmgr.exe and winload.exe files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The _________________________file is the file that replaced the boot.ini file. —

A

Boot Configuration Data BCD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The boot.ini file was used in Windows XP and earlier, and the BCD file was used in —

A

Windows Vista and later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The BCD holds configuration data about which ________________________are installed. —

A

operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You cannot copy a BCD file from another computer and expect it to work properly. The MSCONFIG utility is used to edit the —

A

BCD file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You can also use BCDEdit.exe in Windows —

A

7 and later.

17
Q

The bcdedit.exe utility is used to ___________________the BCD file. —-

A

edit, modify, and update

18
Q

You can also edit the BCD file by using —

A

MSCONFIG.

19
Q

The boot.ini file contains the configuration data for Windows _________________—

A

XP and earlier.

20
Q

The REGSVR32 utility is used to _______________________________dll and ActiveX files in the registry. If a dll file is missing, you should use this utility to register the dll file once it has been replaced. —

A

register and unregister

21
Q

A corrupt registry can only be solved by —

A

restoring the registry from a backup.

22
Q

Missing exe files can only be solved by —

A

re-installing the application.