Module 16 Flashcards
The company that you work for has recently had a security breach. During the recovery and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN.
What can you recommend to the company?
Digital certificate
You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices.
Which of the following steps should be taken to eliminate these trouble tickets?
Enable the supervisor password in the BIOS/UEFI setup.
Derek’s supervisor is concerned that the company’s security system does not comply with the new standards the company has decided to employ. The supervisor has asked Derek to determine how members of the company are authenticated on the network.
What does the computer or server use to verify the access to a specific resource on the network?
Access control list
Your company wants to physically secure the new data center. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center.
What is your company’s new security called?
Mantrap
While there are a number of different types of malicious applications, there can sometimes be common characteristics or exploits of particular weaknesses. Administrators need to be on the lookout constantly for these types of attacks.
Which of the following involves the insertion of various data retrieval statements into an application?
SQL Injection attack
You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.
What type of malware is on your computer?
Virus
Understanding the various types of attacks that a network can experience is a constant learning experience for administrators. Knowing the basic types and categories is important.
Which of the following explains what a DoS attack is?
This type of attack is commonly referred to as a denial-of-service attack
Sharon’s company has written a new computer program, and she has been asked to find a way to prevent people from copying the software they purchase and giving it to others who have not purchased the software.
Which option can Sharon’s company select to ensure that a customer does not share the application it purchases?
Use DRM
James travels for business and is always worried that his laptop will be taken from his room.
Which type of device will ensure that James’s laptop will not be stolen while he travels?
Cable lock
Your company has decided that security is very important and wants to add a second security check when workers are logging in to their computers. The company issued key fobs to all the employees. The key fob generates a code for them to enter when logging in to the computer.
Which security option is your company using?
Hard token
Nick works for a software development company that has just created a new application that will revolutionize the computer security industry. Nick’s company owns the patent for the software and has a copyright for the software. The company would like to sell this new software, but they are concerned about someone pirating the software.
Which option can Nick’s company use to prevent software piracy?
DRM
Oscar has a client who has been receiving unsolicited emails from several companies. Oscar recommended that the client unsubscribe from the email lists, but that just increased the number of unsolicited emails they received.
Which approach to preventing unsolicited emails should be used by Oscar?
Enable a spam filter
A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled.
What is the most likely reason the encryption option is disabled?
Windows Home editions do not support EFS.
Keeping anti-virus applications up to date is an extremely important part of securing a network. Anti-virus applications are constantly on the lookout for any sort of malicious application that could infect a device.
Which of the following might be a common update applied to anti-malware applications?
Malware definitions
A technician, who was signed in to a Windows 10 computer as a local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes.
What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?
The Lock Screen timeout setting needs to be made in the AD OU GPO.