Exam labs Flashcards

1
Q

Which attack listens to network traffic of a computer resource?

A. Resource gathering
B. Denial of service
C. ARP poisoning
D. Eavesdropping
E. Logic bomb
A

D. Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The default password length for a Windows Server domain controller is:

A. 0
B. 5
C. 7
D. 14

A

C. 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does NAT do?

A. It encrypts and authenticates IP packets.
B. It provides caching and reduces network traffic.
C. It translates public IP addresses to private addresses and vice versa.
D. It analyzes incoming and outgoing traffic packets.

A

C. It translates public IP addresses to private addresses and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Role separation improves server security by:

A. Enforcing principle of least privilege.
B. Installing applications on separate hard disks.
C. Physically separating high security servers from other servers.
D. Placing servers on separate VLANs.

A

A. Enforcing principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Graphic Design Institute hires you to help them set up a server for their 20-person
team.
As a general practice of hardening the server, you start by performing which two tasks?
(Choose two.)

A. Disable the guest account.
B. Rename the admin account.
C. Remove the account lockout policy.
D. Format partitions with FAT32.

A

A. Disable the guest account.

B. Rename the admin account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network sniffer is software or hardware that:

A. Records user activity and transmits it to the server
B. Captures and analyzes network communication
C. Protects workstations from intrusions
D. Catalogs network data to create a secure index

A

B. Captures and analyzes network communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?

A. Rainbow table
B. Brute force
C. Spidering
D. Dictionary

A

A. Rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A group of users has access to Folder A and all of its contents. You need to prevent some
of the users from accessing a subfolder inside Folder A.
What should you do first?

A. Disable folder sharing
B. Hide the folder
C. Change the owner
D. Block inheritance

A

D. Block inheritance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Many Internet sites that you visit require a user name and password.
How should you secure these passwords?

A. Save them to a text file
B. Enable session caching
C. Configure the browser to save passwords
D. Save them to an encrypted file
E. Reuse the same password
A

D. Save them to an encrypted file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bridging is a process of sending packets from source to destination on OSI layer 3.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.

A. Routing
B. Switching
C. Repeating
D. No change is needed.

A

A. Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You need to install a domain controller in a branch office. You also need to secure the
information on the domain controller. You will be unable to physically secure the server.
Which should you implement?

A. Read-Only Domain Controller
B. Point-to-Point Tunneling Protocol (PPTP)
C. Layer 2 Tunneling Protocol (L2TP)
D. Server Core Domain Controller

A

A. Read-Only Domain Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two attributes that an email message may contain that should cause a user to
question whether the message is a phishing attempt? (Choose two.)

A. An image contained in the message
B. Spelling and grammar errors
C. Threats of losing service
D. Use of bold and italics

A

B. Spelling and grammar errors

C. Threats of losing service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting
it with the WPS PIN.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.

A. Service Set Identifier (SSID)
B. Admin password
C. WEP key
D. No change is needed

A

A. Service Set Identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To implement WPA2 Enterprise, you would need a/an:

A. RADIUS server
B. SSL server
C. WEP server
D. VPN server

A

A. RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are volunteering at an organization that gets a brand new web server. To make the
server more secure, you should add a second administrator account.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.

A. Disable unused services
B. Enable LM authentication
C. Enable NTLM authentication
D. No change is needed.

A

A. Disable unused services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two characteristics should you recommend for a user’s domain password? (Choose
two.)

A. Hard to guess
B. Includes Unicode characters
C. Easy to remember
D. Easy to increment

A

A. Hard to guess

B. Includes Unicode characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a service set identifier (SSID)?

A. A wireless encryption standard
B. The wireless LAN transmission type
C. The broadcast name of an access point
D. A wireless security protocol

A

C. The broadcast name of an access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which is the minimum requirement to create BitLocker-To-Go media on a client computer?

A. Windows XP Professional Service Pack 3
B. Windows Vista Enterprise Edition
C. Windows 7 Enterprise Edition
D. Windows 2000 Professional Service Pack 4

A

A. Windows XP Professional Service Pack 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The Active Directory controls, enforces, and assigns security policies and access rights for
all users.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.

A. NTFS permissions
B. User Account Control
C. Registry
D. No change is needed

A

D. No change is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which two security settings can be controlled by using group policy? (Choose two.)

A. Password complexity
B. Access to the Run… command
C. Automatic file locking
D. Encrypted access from a smart phone

A

A. Password complexity

B. Access to the Run… command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Coho Winery wants to increase their web presence and hires you to set up a new web
server. Coho already has servers for their business and would like to avoid purchasing a
new one.
Which server is best to use as a web server, considering the security and performance
concerns?

A. SQL Server
B. File Server
C. Domain Controller
D. Application Server

A

D. Application Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cookies impact security by enabling: (Choose two.)

A. Storage of Web site passwords.
B. Higher security Web site protections.
C. Secure Sockets Layer (SSL).
D. Web sites to track browsing habits.

A

A. Storage of Web site passwords.

D. Web sites to track browsing habits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

To protect systems from buffer overflow errors, you can use:

A. Antivirus software
B. Data Execution Prevention
C. A proxy server
D. An Intruder Prevention System

A

B. Data Execution Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Account lockout policies are used to prevent which type of security attack?

A. Brute force attacks
B. Users sharing passwords
C. Social engineering
D. Passwords being reused immediately

A

A. Brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A user who receives a large number of emails selling prescription medicine is probably
receiving pharming mail.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.

A. Malware
B. Spoofed mail
C. Spam
D. No change is needed.

A

C. Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You want to make your computer resistant to online hackers and malicious software.
What should you do?

A. Configure a forward proxy.
B. Install anti-virus software.
C. Enable spam filtering.
D. Turn on Windows Firewall.

A

B. Install anti-virus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The certificate of a secure public Web server on the Internet should be:

A. Issued by a public certificate authority (CA)
B. Signed by using a 4096-bit key
C. Signed by using a 1024-bit key
D. Issued by an enterprise certificate authority (CA)

A

A. Issued by a public certificate authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The primary method of authentication in an SSL connection is passwords.
To answer, choose the option “No change is needed” if the underlined text is correct. If the
underlined text is not correct, choose the correct answer.

A. No change is needed
B. Certificates
C. IPsec
D. Biometrics

A

B. Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a common method for password collection?

A. Email attachments
B. Back door intrusions
C. SQL Injection
D. Network sniffers

A

D. Network sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You are an intern and are working remotely.
You need a solution that meets the following requirements:
✑ Allows you to access data on the company network securely
✑ Gives you the same privileges and access as if you were in the office
What are two connection methods you could use? (Choose two.)

A. Forward Proxy
B. Virtual Private Network (VPN)
C. Remote Access Service (RAS)
D. Roaming Profiles

A

B. Virtual Private Network (VPN)

C. Remote Access Service (RAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A digitally signed e-mail message:

A. Validates the recipient
B. Validates the sender
C. Is encrypted
D. Is virus-free

A

B. Validates the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

To keep third-party content providers from tracking your movements on the web, enable
InPrivate Browsing.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed’’ if the underlined text makes the statement correct.

A. InPrivate Filtering
B. SmartScreen Filter
C. Compatibility Mode
D. No change is needed

A

A. InPrivate Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Keeping a server updated:

A. Maximizes network efficiency
B. Fixes security holes
C. Speeds up folder access
D. Synchronizes the server

A

B. Fixes security holes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Humongous Insurance needs to set up a domain controller in a branch office.
Unfortunately, the server cannot be sufficiently secured from access by employees in that
office, so the company is installing a Primary Domain Controller.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.

A. Read-Only Domain Controller
B. Backup Domain Controller
C. Active Directory Server
D. No change is needed.

A

A. Read-Only Domain Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Phishing is an attempt to:

A. Obtain information by posing as a trustworthy entity.
B. Limit access to e-mail systems by authorized users.
C. Steal data through the use of network intrusion.
D. Corrupt e-mail databases through the use of viruses.

A

A. Obtain information by posing as a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is an example of non-propagating malicious code?

A. A back door
B. A hoax
C. A Trojan horse
D. A worm

A

A. A back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

You create a web server for your school. When users visit your site, they get a certificate
error that says your site is not trusted.
What should you do to fix this problem?

A. Install a certificate from a trusted Certificate Authority (CA).
B. Use a digital signature.
C. Generate a certificate request.
D. Enable Public Keys on your website.

A

A. Install a certificate from a trusted Certificate Authority (CA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Windows Server Update Services (WSUS) is a tool that:

A. Updates data stored in Windows servers
B. Manages the services that run on a server
C. Updates licensing for Windows servers
D. Manages updates for Microsoft software

A

D. Manages updates for Microsoft software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The purpose of Microsoft Baseline Security Analyzer is to:

A. List system vulnerabilities.
B. Apply all current patches to a server.
C. Set permissions to a default level.
D. Correct a company’s security state.

A

A. List system vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In Internet Explorer 8, the InPrivate Browsing feature prevents:

A. Unauthorized private data input.
B. Unencrypted communication between the client computer and the server.
C. User credentials from being sent over the Internet.
D. Any session data from being stored on the computer.

A

D. Any session data from being stored on the computer.

41
Q

Which enables you to change the permissions on a folder?

A. Take ownership
B. Extended attributes
C. Auditing
D. Modify

A

D. Modify

42
Q

To prevent users from copying data to removable media, you should:

A. Lock the computer cases
B. Apply a group policy
C. Disable copy and paste
D. Store media in a locked room

A

B. Apply a group policy

43
Q

Which technology enables you to filter communications between a program and the
Internet?

A. RADIUS server
B. Antivirus software
C. Software firewall
D. BitLocker To Go

A

C. Software firewall

44
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The first line of defense against attacks from the Internet is a software firewall.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed’’ if the underlined text makes the statement correct.

A. hardware firewall
B. virus software
C. radius server
D. No change is needed

A

A. hardware firewall

45
Q

Which type of firewall allows for inspection of all characteristics of a packet?

A. NAT
B. Stateful
C. Stateless
D. Windows Defender

A

B. Stateful

46
Q

You suspect a user’s computer is infected by a virus.
What should you do first?

A. Restart the computer in safe mode
B. Replace the computer’s hard disk drive
C. Disconnect the computer from the network
D. Install antivirus software on the computer

A

D. Install antivirus software on the computer

47
Q

You need to prevent unauthorized users from reading a specific file on a portable computer
if the portable computer is stolen.
What should you implement?

A. File-level permissions
B. Advanced Encryption Standard (AES)
C. Folder-level permissions
D. Distributed File System (DFS)
E. BitLocker
A

E. BitLocker

48
Q

Basic security questions used to reset a password are susceptible to:

A. Hashing
B. Social engineering
C. Network sniffing
D. Trojan horses

A

B. Social engineering

49
Q

Which is a special folder permission?

A. Read
B. Modify
C. Write
D. Delete

A

D. Delete

50
Q

Network Access Protection (NAP) enables administrators to control access to network
resources based on a computer’s:

A. Encryption level
B. Warranty
C. Physical location
D. Configuration

A

D. Configuration

51
Q

A mail system administrator scans for viruses in incoming emails to increase the speed of
mail processing.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.

A. Decrease the chances of a virus getting to a client machine
B. Verify that the senders of the messages are legitimate
C. Ensure that all links in the messages are trustworthy
D. No change is needed.

A

A. Decrease the chances of a virus getting to a client machine

52
Q

Before you deploy Network Access Protection (NAP), you must install:

A. Internet Information Server (IIS)
B. Network Policy Server (NPS)
C. Active Directory Federation Services
D. Windows Update Service

A

B. Network Policy Server (NPS)

53
Q

The company that you work for wants to set up a secure network, but they do not have any
servers.
Which three security methods require the use of a server? (Choose three.)

A. 802.1x
B. WPA2 Personal
C. WPA2 Enterprise
D. RADIUS
E. 802.11ac
A

A. 802.1x
C. WPA2 Enterprise
D. RADIUS

54
Q

What are three major attack vectors that a social engineering hacker may use? (Choose
three.)

A. Telephone
B. Reverse social engineering
C. Waste management
D. Honey pot systems
E. Firewall interface
A

A. Telephone
B. Reverse social engineering
C. Waste management

55
Q

Password history policies are used to prevent:

A. Brute force attacks
B. Users from sharing passwords
C. Social engineering
D. Passwords from being reused immediately

A

D. Passwords from being reused immediately

56
Q

E-mail bombing attacks a specific entity by:

A. Redirecting all e-mail to another entity
B. Sending high volumes of e-mail
C. Tracing e-mail to the destination address
D. Triggering high levels of security alerts

A

B. Sending high volumes of e-mail

57
Q

Which two are included in an enterprise antivirus program? (Choose two.)

A. Attack surface scanning
B. On-demand scanning
C. Packet scanning
D. Scheduled scanning

A

B. On-demand scanning

D. Scheduled scanning

58
Q

The Windows Firewall protects computers from unauthorized network connections.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed’’ if the underlined text makes the statement correct.

A. Email viruses
B. Phishing scams
C. Unencrypted network access
D. No change is needed

A

D. No change is needed

59
Q

When conducting a security audit the first step is to:

A. Inventory the company’s technology assets
B. Install auditing software on your servers
C. Set up the system logs to audit security events
D. Set up a virus quarantine area

A

A. Inventory the company’s technology assets

60
Q

Setting a minimum password age restricts when users can:

A. Request a password reset
B. Change their passwords
C. Log on by using their passwords
D. Set their own password expiration

A

B. Change their passwords

61
Q

The purpose of a digital certificate is to verify that a:

A. Public key belongs to a sender.
B. Computer is virus-free.
C. Private key belongs to a sender.
D. Digital document is complete.

A

A. Public key belongs to a sender.

62
Q

You create a new file in a folder that has inheritance enabled.
By default, the new file:

A. Takes the permissions of the parent folder
B. Does not take any permissions
C. Takes the permissions of other folders in the same directory
D. Takes the permissions of other files in the same directory

A

A. Takes the permissions of the parent folder

63
Q

Dumpster diving refers to a physical threat that a hacker might use to look for information
about a computer network.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.

A. Phishing
B. Malware
C. Reverse Social engineering
D. No change is needed

A

D. No change is needed

64
Q

You need to grant a set of users write access to a file on a network share. You should add
the users to:

A. A security group
B. The Authenticated Users group
C. The Everyone group
D. A distribution group

A

B. The Authenticated Users group

65
Q

Your company requires that users type a series of characters to access the wireless
network.
The series of characters must meet the following requirements:
✑ Contains more than 15 characters
✑ Contains at least one letter
✑ Contains at least one number
✑ Contains at least one symbol
Which security technology meets these requirements?

A. WEP
B. WPA2 PSK
C. WPA2 Enterprise
D. MAC filtering

A

B. WPA2 PSK

66
Q

The manager of a coffee shop hires you to securely set up WiFi in the shop.
To keep computer users from seeing each other, what should you use with an access
point?

A. Client bridge mode
B. Client isolation mode
C. MAC address filtering
D. Client mode

A

B. Client isolation mode

67
Q

You have two servers that run Windows Server. All drives on both servers are formatted by
using NTFS.
You move a file from one server to the other server. The file’s permissions in the new
location will:

A. Enable full access to the everyone group
B. Restrict access to the Administrators group
C. Inherit the destination folder’s permissions
D. Retain the original folder’s permissions

A

C. Inherit the destination folder’s permissions

68
Q

Which three elements does HTTPS encrypt? (Choose three.)

A. Browser cookies
B. Server IP address
C. Port numbers
D. Website URL
E. Login information
A

A. Browser cookies
D. Website URL
E. Login information

69
Q

Shredding documents helps prevent:

A. Man-in-the-middle attacks
B. Social engineering
C. File corruption
D. Remote code execution
E. Social networking
A

B. Social engineering

70
Q

What are three examples of two-factor authentication? (Choose three.)

A. A fingerprint and a pattern
B. A password and a smart card
C. A username and a password
D. A password and a pin number
E. A pin number and a debit card
A

A. A fingerprint and a pattern
B. A password and a smart card
E. A pin number and a debit card

71
Q

Passwords that contain recognizable words are vulnerable to a:

A. Denial of Service attack
B. Hashing attack
C. Dictionary attack
D. Replay attack

A

C. Dictionary attack

72
Q

A brute force attack:

A. Uses response filtering
B. Tries all possible password variations
C. Uses the strongest possible algorithms
D. Targets all the ports

A

B. Tries all possible password variations

73
Q

The purpose of User Account Control (UAC) is to:

A. Encrypt the user’s account
B. Limit the privileges of software
C. Secure your data from corruption
D. Facilitate Internet filtering

A

B. Limit the privileges of software

74
Q

You need to allow Remote Desktop to be able to get through your firewall for users on your
company’s network.
Which settings should you enable?

A. Remote Assistance: Home/Work (Private)
B. Remote Desktop: Public
C. Remote Desktop: Home/Work (Private)
D. Remote Assistance: Domain

A

A. Remote Assistance: Home/Work (Private)

75
Q

Windows Firewall is a built-in. host-based, stateless firewall.
Select the correct answer if the underlined text does not make the statement correct. Select
“No change is needed” if the underlined text makes the statement correct.

A. Stateful
B. Network layer
C. Packet filter
D. No change is needed

A

A. Stateful

76
Q

An attorney hires you to increase the wireless network security for the law firm’s office. The
office has a very basic network, with just a modem and a router.
Which of these security modes offers the highest security?

A. WPA-Personal
B. WEP
C. WPA2-Personal
D. WPA-Enterprise

A

C. WPA2-Personal

77
Q

What is the primary advantage of using Active Directory Integrated Zones?

A. Zone encryption
B. Password protection
C. Non-repudiation
D. Secure replication

A

D. Secure replication

78
Q

You sign up for an online bank account. Every 6 months, the bank requires you to change
your password. You have changed your password 5 times in the past. Instead of coming up
with a new password, you decide to use one of your past passwords, but the bank’s
password history prevents you on doing so.
Select the correct answer if the underlined text does not make the statement correct Select
“No change is needed” if the underlined text makes the statement correct.

A. Minimum password age
B. Maximum password duration
C. Password complexity
D. No change is needed.

A

D. No change is needed.

79
Q

You have a Windows 7 desktop computer, and you create a Standard User account for
your roommate so that he can use the desktop from time to time. Your roommate has
forgotten his password.
Which two actions can you take to reset the password? (Choose two.)

A. Use your password reset disk.
B. Use your administrator account.
C. Boot into Safe Mode with your roommate’s account.
D. From your roommate’s account press CTRL+ALT+DELETE, and then click Change a password.

A

A. Use your password reset disk.

B. Use your administrator account.

80
Q

Which password attack uses all possible alpha numeric combinations?

A. Social engineering
B. Brute force attack
C. Dictionary attack
D. Rainbow table attack

A

B. Brute force attack

81
Q

You need to limit the programs that can run on client computers to a specific list.
Which technology should you implement?

A. Windows Security Center
B. Security Accounts Manager
C. System Configuration Utility
D. AppLocker group policies

A

D. AppLocker group policies

82
Q

Creating MD5 hash for files is an example of ensuring what?

A. Confidentiality
B. Availability
C. Least privilege
D. Integrity

A

D. Integrity

83
Q

Physically securing servers prevents:

A. Theft
B. Compromise of the certificate chain
C. Man-in-the middle attacks
D. Denial of Service attacks

A

A. Theft

84
Q

Which of the following describes a VLAN?

A. It connects multiple networks and routes data packets.
B. It is a logical broadcast domain across physical subnets.
C. It is a subnetwork that reveals a company’s externally facing resources to the public network.
D. It allows different network protocols to communicate between different network segments.

A

B. It is a logical broadcast domain across physical subnets.

85
Q

E-mail spoofing:

A. Forwards e-mail messages to all contacts
B. Copies e-mail messages sent from a specific user
C. Obscures the true e-mail sender
D. Modifies e-mail routing logs

A

C. Obscures the true e-mail sender

86
Q

The client computers on your network are stable and do not need any new features.
Which is a benefit of applying operating system updates to these clients?

A. Keep the software licensed
B. Keep the server ports available
C. Update the hardware firewall
D. Close existing vulnerabilities

A

D. Close existing vulnerabilities

87
Q

What does implementing Windows Server Update Services (WSUS) allow a company to
manage?

A. Shared private encryption key updates
B. Updates to Group Policy Objects
C. Active Directory server replication
D. Windows updates for workstations and servers

A

D. Windows updates for workstations and servers

88
Q

The primary purpose of Network Access Protection (NAP) is to prevent:

A. Loss of data from client computers on a network.
B. Non-compliant systems from connecting to a network.
C. Users on a network from installing software.
D. Unauthorized users from accessing a network.

A

B. Non-compliant systems from connecting to a network.

89
Q

You are trying to establish communications between a client computer and a server. The
server is not responding.
You confirm that both the client and the server have network connectivity.
Which should you check next?

A. Microsoft Update
B. Data Execution Prevention
C. Windows Firewall
D. Active Directory Domains and Trusts

A

D. Active Directory Domains and Trusts

90
Q

You are an intern at Litware, Inc. Your manager asks you to make password guess
attempts harder by limiting login attempts on company computers.
What should you do?

A. Enforce password sniffing.
B. Enforce password history.
C. Make password complexity requirements higher.
D. Implement account lockout policy.

A

D. Implement account lockout policy.

91
Q

You would implement a wireless intrusion prevention system to:

A. Prevent wireless interference
B. Detect wireless packet theft
C. Prevent rogue wireless access points
D. Enforce SSID broadcasting

A

C. Prevent rogue wireless access points

92
Q

What is the standard or basic collection of NTFS permissions?

A. Read and execute, read, write, full control, modify, list folder contents
B. Change permissions, read permissions, write permissions
C. Read attributes, list folder/read data, traverse folder/execute file
D. Create files/write data, create folders/append data, take ownership

A

A. Read and execute, read, write, full control, modify, list folder contents

93
Q

You are an intern at Wide World Importers and help manage 1000 workstations. All the
workstations are members of an Active Domain.
You need to push out an internal certificate to Internet Explorer on all workstations.
What is the quickest method to do this?

A. Local policy
B. Logon script
C. Windows Update
D. Group policy

A

D. Group policy

94
Q

How does the sender policy framework (SPF) aim to reduce spoofed email?

A. It provides a list of IP address ranges for particular domains so senders can be verified.
B. It includes an XML policy file with each email that confirms the validity of the message.
C. It lists servers that may legitimately forward mail for a particular domain.
D. It provides an encryption key so that authenticity of an email message can be validated

A

C. It lists servers that may legitimately forward mail for a particular domain.

95
Q

You are trying to connect to an FTP server on the Internet from a computer in a school lab.
You cannot get a connection. You try on another computer with the same results. The
computers in the lab are able to browse the Internet.
You are able to connect to this FTP server from home.
What could be blocking the connection to the server?

A. A layer-2 switch
B. A wireless access point
C. A firewall
D. A layer-2 hub

A

C. A firewall

96
Q

Humongous Insurance is an online healthcare insurance company. During an annual
security audit a security firm tests the strength of the company’s password policy and
suggests that Humongous Insurance implement password history policy.
What is the likely reason that the security firm suggests this?

A. Past passwords were easily cracked by the brute force method.
B. Past passwords of users contained dictionary words.
C. Previous password breaches involved use of past passwords.
D. Past passwords lacked complexity and special characters.

A

C. Previous password breaches involved use of past passwords.

97
Q

Which enables access to all of the logged-in user’s capabilities on a computer?

A. Java applets
B. ActiveX controls
C. Active Server Pages (ASP)
D. Microsoft Silverlight

A

B. ActiveX controls

98
Q

Where should you lock up the backup tapes for your servers?

A. The server room
B. A filing cabinet
C. The tape library
D. An offsite fire safe

A

D. An offsite fire safe

99
Q

Which provides the highest level of security in a firewall?

A. Stateful inspection
B. Outbound packet filters
C. Stateless inspection
D. Inbound packet filters

A

A. Stateful inspection