MTA Security Flashcards
Certification Practice
What directory service is used with Windows domains?
a. E-Directory
b. Active Directory
c. Kerberos
d. PAM
Active Directory
What is used to provide protection when one line of defense is breached?
a. Attack surface
b. Risk mitigation
c. Principle of least privilege
d. Defense in depth
Defense in depth
What is the process of giving individual access to a system or resource?
a. Authentication
b. Authorization
c. Auditing
d. Accounting
Authorization
WHat malware looks like a useful or desired executable program but is in reality a program that is supposed to cause harm to your computer or steal information from your computer?
a. Worm
b. Backdoor
c. Virus
d. Trojan horse
Trojan horse
On which OSI layer do TCP and UDP function?
a. 1
b. 2
c. 3
d. 4
4
What do you call a password that is at least seven characters long and usews three of the following categories (uppercase, lowercase, numbers, and special characters)?
a. Complex password
b. Standard password
c. Migrating password
d. Healthy pawssword
Complex password
What item, about he size of a credit card, allows access to a network and its resources?
a. Smart card
b. Biometric
c. Digital certificate
d. Security token
Smart card
In deaing with risks, which response is done by buying insurance to protect your bottom line if such a disaster or threat is realized?
a. Risk transfer
b. Risk mitigation
c. Risk avoidance
d. Risk acceptance
Risk transfer
Which type of group can be granted rights and permissions?
a. SAM
b. Authorizing
c. Distribution
d. Security
Security
What OSI layer do switches and bridges use?
a. 4
b. 3
c. 1
d. 2
2
Which concept determines what resources users can access after they log on?
a. Auditing
b. Defense in depth
c. Authentication
d. Access control
Access control
What type of self-replicating program copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources?
a. Worm
b. Backdoor
c. Virus
d. Trojan horse
Worm