902.4 Flashcards

1
Q

Net Use Command Line

A

allows you to connect to, remove, and configure connections to shared resources, like mapped drives and network printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

nslookup Command Line

A

Uses DNS server to find the corresponding IP address to a hostname you specify or the same thing in reverse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which tools in Windows 10 would you use to browse all networks and shared folders to which a user has access? (3)

A

Network
File Explorer
This PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing is a form of what

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trusted Platform Module (TPM) can generate a

A

hash value based on the components installed in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of the Hash Value TPM creates?

A

can be used to verify that system components have not been modified when the system boots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pharming redirects one website’s traffic

A

to another, bogus website that is designed to look like the real website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does Pharming affect the host and DNS server

A
  • Changing the hosts file of a user’s computer

- Poison a DNS Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proxy Server

A
  • Prevent access to specific websites

- Cache (save) frequently ­used web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Acceptable Use Policy

A

defines an employee’s rights to use company property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Password Policy

A

identifies the requirements for passwords used to authenticate to company­owned systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

All­-in-­one security appliance features(4)

A
  • firewall
  • email scanner
  • content filter,
  • intrusion prevention system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN concentrator is

A

configured to accept VPN connections from individual hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PPTP (Point to Point Tunneling Protocol)

A

is used with VPNs, which allow you to send data securely over a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSL VPN authenticates the server to the client

A

using public key cryptography and digital certificates.

  • Also Encrypts the entire communication session
  • & Uses port 443
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A key fob can be issued to

A

an employee that presents a security code or PIN that changes at predetermined intervals.

17
Q

When securing a Windows computer that is in a home office and not part of a domain

A

a best practice is to rename the Administrator account and disable the Guest account.

18
Q

To connect to an administrative share, you

A

must use the UNC path Because administrative shares are not visible when browsing the network

19
Q

By default, Windows automatically creates an administrative share

A

for every volume. With the share name being the volume letter plus the dollar sign (such as C$).

20
Q

When evaluating the interaction between Share and NTFS permissions, remember

A

the most restrictive set of permissions takes precedence.

21
Q

How to enable screen saver password on Windows 7

A

Personalization option in Control Panel

22
Q

Hoax virus

A

preys on e­mail recipients who are fearful and will believe most information if it is presented in a professional manner.

23
Q

Hoax virus information e­mails are

A

a form of social engineering attack

24
Q

A virtual private network uses which protocols? (3)

A

IPSec, PPTP, or L2TP

25
Q

Malware Infection symptoms?

A
  • Operating system lock ups
  • Windows update failures
  • Renamed system files
  • Disappearing files
  • Changed file permissions
  • Access denied errors
26
Q

Social engineering is an attack

A

an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems.

27
Q

Phishing

A

attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization.

28
Q

How does Pharming affect DHCP server?

A

-Exploiting DHCP servers to deliver the IP address of malicious DNS servers in DHCP leases