MTA Security Flashcards

Certification Practice

1
Q

What directory service is used with Windows domains?

a. E-Directory
b. Active Directory
c. Kerberos
d. PAM

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is used to provide protection when one line of defense is breached?

a. Attack surface
b. Risk mitigation
c. Principle of least privilege
d. Defense in depth

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the process of giving individual access to a system or resource?

a. Authentication
b. Authorization
c. Auditing
d. Accounting

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHat malware looks like a useful or desired executable program but is in reality a program that is supposed to cause harm to your computer or steal information from your computer?

a. Worm
b. Backdoor
c. Virus
d. Trojan horse

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On which OSI layer do TCP and UDP function?

a. 1
b. 2
c. 3
d. 4

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do you call a password that is at least seven characters long and usews three of the following categories (uppercase, lowercase, numbers, and special characters)?

a. Complex password
b. Standard password
c. Migrating password
d. Healthy pawssword

A

Complex password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What item, about he size of a credit card, allows access to a network and its resources?

a. Smart card
b. Biometric
c. Digital certificate
d. Security token

A

Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In deaing with risks, which response is done by buying insurance to protect your bottom line if such a disaster or threat is realized?

a. Risk transfer
b. Risk mitigation
c. Risk avoidance
d. Risk acceptance

A

Risk transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of group can be granted rights and permissions?

a. SAM
b. Authorizing
c. Distribution
d. Security

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What OSI layer do switches and bridges use?

a. 4
b. 3
c. 1
d. 2

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which concept determines what resources users can access after they log on?

a. Auditing
b. Defense in depth
c. Authentication
d. Access control

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of self-replicating program copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources?

a. Worm
b. Backdoor
c. Virus
d. Trojan horse

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly