902.4 Flashcards

1
Q

Net Use Command Line

A

allows you to connect to, remove, and configure connections to shared resources, like mapped drives and network printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

nslookup Command Line

A

Uses DNS server to find the corresponding IP address to a hostname you specify or the same thing in reverse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which tools in Windows 10 would you use to browse all networks and shared folders to which a user has access? (3)

A

Network
File Explorer
This PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing is a form of what

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trusted Platform Module (TPM) can generate a

A

hash value based on the components installed in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of the Hash Value TPM creates?

A

can be used to verify that system components have not been modified when the system boots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pharming redirects one website’s traffic

A

to another, bogus website that is designed to look like the real website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does Pharming affect the host and DNS server

A
  • Changing the hosts file of a user’s computer

- Poison a DNS Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proxy Server

A
  • Prevent access to specific websites

- Cache (save) frequently ­used web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Acceptable Use Policy

A

defines an employee’s rights to use company property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Password Policy

A

identifies the requirements for passwords used to authenticate to company­owned systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

All­-in-­one security appliance features(4)

A
  • firewall
  • email scanner
  • content filter,
  • intrusion prevention system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN concentrator is

A

configured to accept VPN connections from individual hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PPTP (Point to Point Tunneling Protocol)

A

is used with VPNs, which allow you to send data securely over a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSL VPN authenticates the server to the client

A

using public key cryptography and digital certificates.

  • Also Encrypts the entire communication session
  • & Uses port 443
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A key fob can be issued to

A

an employee that presents a security code or PIN that changes at predetermined intervals.

17
Q

When securing a Windows computer that is in a home office and not part of a domain

A

a best practice is to rename the Administrator account and disable the Guest account.

18
Q

To connect to an administrative share, you

A

must use the UNC path Because administrative shares are not visible when browsing the network

19
Q

By default, Windows automatically creates an administrative share

A

for every volume. With the share name being the volume letter plus the dollar sign (such as C$).

20
Q

When evaluating the interaction between Share and NTFS permissions, remember

A

the most restrictive set of permissions takes precedence.

21
Q

How to enable screen saver password on Windows 7

A

Personalization option in Control Panel

22
Q

Hoax virus

A

preys on e­mail recipients who are fearful and will believe most information if it is presented in a professional manner.

23
Q

Hoax virus information e­mails are

A

a form of social engineering attack

24
Q

A virtual private network uses which protocols? (3)

A

IPSec, PPTP, or L2TP

25
Malware Infection symptoms?
- Operating system lock ups - Windows update failures - Renamed system files - Disappearing files - Changed file permissions - Access denied errors
26
Social engineering is an attack
an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems.
27
Phishing
attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization.
28
How does Pharming affect DHCP server?
-Exploiting DHCP servers to deliver the IP address of malicious DNS servers in DHCP leases