Deck #100 Flashcards

1
Q

A network administrator would like to prevent specific Windows devices from connecting to a SOHO wireless network. Which of the following would be the BEST choice for this requirement?

a) URL filtering
b) SSID suppression
c) Static IP addressing
d) MAC filtering
e) 802.1X
f) A pair of scissors

A

d) MAC (Media Access Control) filtering provides a method of controlling access to a network based on the physical address of the network adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company is donating some old computers to a local charity, and they want to keep the existing hard drives usable but remove all data from the drives. Which of the following would be the BEST way to accomplish this?

a) Deguass
b) Regular format
c) Shred
d) Drill
e) Quick format
f) Change all financial report names to smiley face
emoticons

A

b) A regular format will overwrite each sector with zeros. None of the previously stored information will be recoverable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user has configured their mobile device to unlock using a fingerprint. Which of the following would describe this feature?

a) Biometrics
b) Authenticator app
c) Full device encryption
d) Anti-virus
e) Gyroscope
f) It even works at 10 percent battery life

A

a) A fingerprint is a biometric factor categorized as something you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would be the NEXT step for an account with excessive invalid login attempts?
Delete the account

a) Ask the user for a previous password
b) Send a text message code to the user
c) Lockout the account
d) Ask the user for their mother’s maiden name
e) The caps lock key is taunting me

A

c) An excessive number of login attempts can indicate a brute force attack, and the first response should be to lock the account and require an account reset from the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

During the login process, a user provides a six digit code. Which of the following would BEST describe this?

a) Proximity card
b) TOTP
c) Biometrics
d) Smart card
e) Certificate
f) I knew I forgot something

A

b) A TOTP (Time-based One-Time Password) uses a pseudo-random value as an authentication factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following would BEST describe a virus that is able to infect a system without any notification from a recently updated anti-virus utility?

a) DDoS
b) Spoofing
c) Social engineering
d) Man-in-the-middle
e) Zero-day
f) I’ll just turn it off and back on again

A

e) A zero-day vulnerability is one that is previously unknown to the general public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company’s WAN router has been attacked by hackers and the router is not responding to internal commands. Which of the following would BEST describe this attack?

a) Man-in-the-middle
b) Buffer overflow
c) DoS
d) Brute force
e) Spoofing
f) Those backups are around here somewhere

A

c) A DoS (Denial of Service) describes an attack that disables or inhibits a service from operating normally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An email states that a bank account will be closed and funds removed unless contact information is updated. Which of these social engineering principles is the email using?

a) Authority
b) Scarcity
c) Intimidation
d) Trust
e) Familiarity
f) Begging

A

c) Intimidation usually involves the threat of unwanted circumstances if the request is not followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly