Exam labs Flashcards
Which attack listens to network traffic of a computer resource?
A. Resource gathering B. Denial of service C. ARP poisoning D. Eavesdropping E. Logic bomb
D. Eavesdropping
The default password length for a Windows Server domain controller is:
A. 0
B. 5
C. 7
D. 14
C. 7
What does NAT do?
A. It encrypts and authenticates IP packets.
B. It provides caching and reduces network traffic.
C. It translates public IP addresses to private addresses and vice versa.
D. It analyzes incoming and outgoing traffic packets.
C. It translates public IP addresses to private addresses and vice versa.
Role separation improves server security by:
A. Enforcing principle of least privilege.
B. Installing applications on separate hard disks.
C. Physically separating high security servers from other servers.
D. Placing servers on separate VLANs.
A. Enforcing principle of least privilege.
The Graphic Design Institute hires you to help them set up a server for their 20-person
team.
As a general practice of hardening the server, you start by performing which two tasks?
(Choose two.)
A. Disable the guest account.
B. Rename the admin account.
C. Remove the account lockout policy.
D. Format partitions with FAT32.
A. Disable the guest account.
B. Rename the admin account.
A network sniffer is software or hardware that:
A. Records user activity and transmits it to the server
B. Captures and analyzes network communication
C. Protects workstations from intrusions
D. Catalogs network data to create a secure index
B. Captures and analyzes network communication
Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?
A. Rainbow table
B. Brute force
C. Spidering
D. Dictionary
A. Rainbow table
A group of users has access to Folder A and all of its contents. You need to prevent some
of the users from accessing a subfolder inside Folder A.
What should you do first?
A. Disable folder sharing
B. Hide the folder
C. Change the owner
D. Block inheritance
D. Block inheritance
Many Internet sites that you visit require a user name and password.
How should you secure these passwords?
A. Save them to a text file B. Enable session caching C. Configure the browser to save passwords D. Save them to an encrypted file E. Reuse the same password
D. Save them to an encrypted file
Bridging is a process of sending packets from source to destination on OSI layer 3.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.
A. Routing
B. Switching
C. Repeating
D. No change is needed.
A. Routing
You need to install a domain controller in a branch office. You also need to secure the
information on the domain controller. You will be unable to physically secure the server.
Which should you implement?
A. Read-Only Domain Controller
B. Point-to-Point Tunneling Protocol (PPTP)
C. Layer 2 Tunneling Protocol (L2TP)
D. Server Core Domain Controller
A. Read-Only Domain Controller
What are two attributes that an email message may contain that should cause a user to
question whether the message is a phishing attempt? (Choose two.)
A. An image contained in the message
B. Spelling and grammar errors
C. Threats of losing service
D. Use of bold and italics
B. Spelling and grammar errors
C. Threats of losing service
The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting
it with the WPS PIN.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.
A. Service Set Identifier (SSID)
B. Admin password
C. WEP key
D. No change is needed
A. Service Set Identifier (SSID)
To implement WPA2 Enterprise, you would need a/an:
A. RADIUS server
B. SSL server
C. WEP server
D. VPN server
A. RADIUS server
You are volunteering at an organization that gets a brand new web server. To make the
server more secure, you should add a second administrator account.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.
A. Disable unused services
B. Enable LM authentication
C. Enable NTLM authentication
D. No change is needed.
A. Disable unused services
Which two characteristics should you recommend for a user’s domain password? (Choose
two.)
A. Hard to guess
B. Includes Unicode characters
C. Easy to remember
D. Easy to increment
A. Hard to guess
B. Includes Unicode characters
What is a service set identifier (SSID)?
A. A wireless encryption standard
B. The wireless LAN transmission type
C. The broadcast name of an access point
D. A wireless security protocol
C. The broadcast name of an access point
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?
A. Windows XP Professional Service Pack 3
B. Windows Vista Enterprise Edition
C. Windows 7 Enterprise Edition
D. Windows 2000 Professional Service Pack 4
A. Windows XP Professional Service Pack 3
The Active Directory controls, enforces, and assigns security policies and access rights for
all users.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.
A. NTFS permissions
B. User Account Control
C. Registry
D. No change is needed
D. No change is needed
Which two security settings can be controlled by using group policy? (Choose two.)
A. Password complexity
B. Access to the Run… command
C. Automatic file locking
D. Encrypted access from a smart phone
A. Password complexity
B. Access to the Run… command
Coho Winery wants to increase their web presence and hires you to set up a new web
server. Coho already has servers for their business and would like to avoid purchasing a
new one.
Which server is best to use as a web server, considering the security and performance
concerns?
A. SQL Server
B. File Server
C. Domain Controller
D. Application Server
D. Application Server
Cookies impact security by enabling: (Choose two.)
A. Storage of Web site passwords.
B. Higher security Web site protections.
C. Secure Sockets Layer (SSL).
D. Web sites to track browsing habits.
A. Storage of Web site passwords.
D. Web sites to track browsing habits.
To protect systems from buffer overflow errors, you can use:
A. Antivirus software
B. Data Execution Prevention
C. A proxy server
D. An Intruder Prevention System
B. Data Execution Prevention
Account lockout policies are used to prevent which type of security attack?
A. Brute force attacks
B. Users sharing passwords
C. Social engineering
D. Passwords being reused immediately
A. Brute force attacks
A user who receives a large number of emails selling prescription medicine is probably
receiving pharming mail.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.
A. Malware
B. Spoofed mail
C. Spam
D. No change is needed.
C. Spam
You want to make your computer resistant to online hackers and malicious software.
What should you do?
A. Configure a forward proxy.
B. Install anti-virus software.
C. Enable spam filtering.
D. Turn on Windows Firewall.
B. Install anti-virus software.
The certificate of a secure public Web server on the Internet should be:
A. Issued by a public certificate authority (CA)
B. Signed by using a 4096-bit key
C. Signed by using a 1024-bit key
D. Issued by an enterprise certificate authority (CA)
A. Issued by a public certificate authority (CA)
The primary method of authentication in an SSL connection is passwords.
To answer, choose the option “No change is needed” if the underlined text is correct. If the
underlined text is not correct, choose the correct answer.
A. No change is needed
B. Certificates
C. IPsec
D. Biometrics
B. Certificates
What is a common method for password collection?
A. Email attachments
B. Back door intrusions
C. SQL Injection
D. Network sniffers
D. Network sniffers
You are an intern and are working remotely.
You need a solution that meets the following requirements:
✑ Allows you to access data on the company network securely
✑ Gives you the same privileges and access as if you were in the office
What are two connection methods you could use? (Choose two.)
A. Forward Proxy
B. Virtual Private Network (VPN)
C. Remote Access Service (RAS)
D. Roaming Profiles
B. Virtual Private Network (VPN)
C. Remote Access Service (RAS)
A digitally signed e-mail message:
A. Validates the recipient
B. Validates the sender
C. Is encrypted
D. Is virus-free
B. Validates the sender
To keep third-party content providers from tracking your movements on the web, enable
InPrivate Browsing.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed’’ if the underlined text makes the statement correct.
A. InPrivate Filtering
B. SmartScreen Filter
C. Compatibility Mode
D. No change is needed
A. InPrivate Filtering
Keeping a server updated:
A. Maximizes network efficiency
B. Fixes security holes
C. Speeds up folder access
D. Synchronizes the server
B. Fixes security holes
Humongous Insurance needs to set up a domain controller in a branch office.
Unfortunately, the server cannot be sufficiently secured from access by employees in that
office, so the company is installing a Primary Domain Controller.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.
A. Read-Only Domain Controller
B. Backup Domain Controller
C. Active Directory Server
D. No change is needed.
A. Read-Only Domain Controller
Phishing is an attempt to:
A. Obtain information by posing as a trustworthy entity.
B. Limit access to e-mail systems by authorized users.
C. Steal data through the use of network intrusion.
D. Corrupt e-mail databases through the use of viruses.
A. Obtain information by posing as a trustworthy entity.
What is an example of non-propagating malicious code?
A. A back door
B. A hoax
C. A Trojan horse
D. A worm
A. A back door
You create a web server for your school. When users visit your site, they get a certificate
error that says your site is not trusted.
What should you do to fix this problem?
A. Install a certificate from a trusted Certificate Authority (CA).
B. Use a digital signature.
C. Generate a certificate request.
D. Enable Public Keys on your website.
A. Install a certificate from a trusted Certificate Authority (CA).
Windows Server Update Services (WSUS) is a tool that:
A. Updates data stored in Windows servers
B. Manages the services that run on a server
C. Updates licensing for Windows servers
D. Manages updates for Microsoft software
D. Manages updates for Microsoft software
The purpose of Microsoft Baseline Security Analyzer is to:
A. List system vulnerabilities.
B. Apply all current patches to a server.
C. Set permissions to a default level.
D. Correct a company’s security state.
A. List system vulnerabilities.