Module 16 Flashcards

1
Q

The company that you work for has recently had a security breach. During the recovery and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN.

What can you recommend to the company?

A

Digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices.

Which of the following steps should be taken to eliminate these trouble tickets?

A

Enable the supervisor password in the BIOS/UEFI setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Derek’s supervisor is concerned that the company’s security system does not comply with the new standards the company has decided to employ. The supervisor has asked Derek to determine how members of the company are authenticated on the network.

What does the computer or server use to verify the access to a specific resource on the network?

A

Access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your company wants to physically secure the new data center. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center.

What is your company’s new security called?

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

While there are a number of different types of malicious applications, there can sometimes be common characteristics or exploits of particular weaknesses. Administrators need to be on the lookout constantly for these types of attacks.

Which of the following involves the insertion of various data retrieval statements into an application?

A

SQL Injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.

What type of malware is on your computer?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Understanding the various types of attacks that a network can experience is a constant learning experience for administrators. Knowing the basic types and categories is important.

Which of the following explains what a DoS attack is?

A

This type of attack is commonly referred to as a denial-of-service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sharon’s company has written a new computer program, and she has been asked to find a way to prevent people from copying the software they purchase and giving it to others who have not purchased the software.

Which option can Sharon’s company select to ensure that a customer does not share the application it purchases?

A

Use DRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

James travels for business and is always worried that his laptop will be taken from his room.

Which type of device will ensure that James’s laptop will not be stolen while he travels?

A

Cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your company has decided that security is very important and wants to add a second security check when workers are logging in to their computers. The company issued key fobs to all the employees. The key fob generates a code for them to enter when logging in to the computer.

Which security option is your company using?

A

Hard token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nick works for a software development company that has just created a new application that will revolutionize the computer security industry. Nick’s company owns the patent for the software and has a copyright for the software. The company would like to sell this new software, but they are concerned about someone pirating the software.

Which option can Nick’s company use to prevent software piracy?

A

DRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Oscar has a client who has been receiving unsolicited emails from several companies. Oscar recommended that the client unsubscribe from the email lists, but that just increased the number of unsolicited emails they received.

Which approach to preventing unsolicited emails should be used by Oscar?

A

Enable a spam filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled.

What is the most likely reason the encryption option is disabled?

A

Windows Home editions do not support EFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keeping anti-virus applications up to date is an extremely important part of securing a network. Anti-virus applications are constantly on the lookout for any sort of malicious application that could infect a device.

Which of the following might be a common update applied to anti-malware applications?

A

Malware definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician, who was signed in to a Windows 10 computer as a local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes.

What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?

A

The Lock Screen timeout setting needs to be made in the AD OU GPO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lance works for a company that allows users to bring their own devices to work. Last week Lance purchased a software package from a company that allows him to change fonts on pictures that he uses in his work presentations. Lance wants to share the program with his coworker Susan.

Which option would be apt for Lance’s permission to share the application with Susan?

A

Susan would need to purchase the software from the company.

17
Q

Ken has discovered that a vice president of his company has been using their computer to send data about a new product to a competitor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent.

Which would be the most appropriate option for Ken to complete next?

A

Report the person through proper channels.

18
Q

Which of the following security settings can best help minimize brute force attacks on local user account passwords?

A

Account lockout threshold

19
Q

Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation, she receives an error message saying the software cannot be installed. The error reports that she does not have the privilege to install software. Jennifer is using the administrator account, so she knows she should be able to install the program.

Which Windows option can Jennifer use to install anti-malware software?

A

Install in Safe Mode.

20
Q

A coworker asks your opinion about how to minimize ActiveX attacks while they browse the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls but can’t remember which tab to use.

What tab would suggest the coworker look in for the ActiveX controls?

A

Security tab

21
Q

Alexandria works for a not-for-profit company that asks for donations to help the homeless in her community. Recently the database that holds all the contact information about the doners was hacked, and all the data was copied.

What type of data was taken?

A

PII

22
Q

Tracy works for an insurance company that recently received so much spam that the email server became overwhelmed and shut down. Tracy’s supervisor has asked her to make sure this does not happen again.

What is the first thing Tracy should do to prevent this problem from happening again?

A

Email filtering

23
Q

An operating system is responsible for validating certificates used to secure communication. For Windows, Microsoft maintains a database of trusted root certificates issued by Certificate Authorities (CAs). A root certificate is the original certificate issued by the CA. When a Windows system opens a secure email or visits a secure website and encounters a new digital certificate, it requests Microsoft’s trusted root certificate, which is downloaded to the computer. The download happens seamlessly without the user’s knowledge unless there’s a problem. If Windows cannot obtain the root certificate to validate the email or website, an error is displayed.

Where do you go in the Windows operating system to view and delete root certificates?

A

Certificate Manager

24
Q

You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords.

Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

A

Lengthen the time period between forced password changes.

25
Q

As administrators and other IT support personnel get to know the various types of malware, grayware, and other types of resource stealing and draining applications, it is important to know how each type works.

Which of the following is an unwanted application that substitutes itself for a legitimate application?

A

Trojan

26
Q

Peggy found a freely distributed software package for her small business that will allow its sales to be tracked into a database for inventory purposes.

Can Peggy install this software on all the computers in her store?

A

Yes, this is open-source software

27
Q

Your computer has a single HDD formatted with NTFS with the following data folders:

C:\Documents

C:\Pictures

You create a new child folder under the C:\Documents folder.

What term describes the permissions the new folder automatically attains from the C:\Documents folder?

A

Inherited permissions

28
Q

Jeff owns a health care company that sells medical supplies. The company bills health insurance companies for their customers. They are required by the insurance companies to complete paperwork that includes personal and health information. Which option describes the regulated data Jeff’s organization needs to secure?

A

PHI (The H stands for health)