Security Flashcards
Which user group should you assign to a new account on a Windows system if you want the user to have the ability to create and edit private files. stop and start the system, install applications, and add new device drivers?
Administrators
While browsing the internet, you observe that your browser shows pop-up ads related to your recent keyword searches. What is this an example of?
Adware
Which of the following is a valid distinguished name for the SocialBook common domain name?
SocialBook.org
You have been contracted to assess a client’s building security. During your evaluation, you observe the following: all equipment secured with cable locks, server racks are locked and equipped with alarms, WAP for the guest Wi-Fi positioned on the receptionist’s desk, biometric locks are installed on high-security rooms. Based on these observations, which recommendation would you MOST likely make to enhance the client’s security?
Install the WAP on the ceiling or inside of a special locked box.
A user finds they cannot access their computer files and receives a pop-up message stating that the files have been encrypted, along with instructions for purchasing a decryption. What type of malware is this?
Ransomware
You are responsible for managing numerous workstations in a Windows domain and need to prevent unauthorized access through repeated password attempts. Which default Group Policy Object (GPO) includes a policy that you can enable to protect all domain computers from this type of security threat?
Default Domain Policy
While reviewing video footage from your organization’s security cameras, you observe a suspicious individual using piggybacking to enter your building without a security badge. What security measure would you MOST likely implement to prevent this from happening in the future?
Access control vesitbule
As a junior network technician at the local hospital, you’ve learned that the security administrator has implemented a new policy requiring users to log in to workstations using a fingerprint scanner. Which category of authentication does this represent?
Something you are
What term is used to describe a system that lacks any anti-malware or firewall protection?
Unprotected
What is an example of a hard token?
Smart card
What is an example of multi-factor authentication?
PIN and authentication app
A malicious individual contacts an employee via cell phone, claiming to be the vice president of the accounting department within the employee’s company. She states that she has forgotten her password and insists that the employee provide his password so she can access necessary reports for an upcoming presentation. She threatens to fire him if he refuses to comply. Which type of attack BEST characterize?
Vishing
Which type of password cracking attack uses a list of words and phrases to guess the password?
Dictionary attack
Lisa, an employee in HR, has created several important PDF documents that all office managers in her building need to access easily. She wants to ensure the files are easy to find and requires minimal maintenance while ensuring no other users can view them. As the IT technician, which solution would BEST meet Lisa’s requirements?
Network share
To add a new computer to the SkyNet domain, which System Properties setting should be used?
System Properties > Computer Name
An unauthorized individual gains entry to a secure area by following an authorized person through a door equipped with a badge reader. Which type of security threat does this situation illustrate?
Tailgating
You have been brought in to evaluate a client’s security protocols. While conducting your assessment, you find that users an access files belonging to other departments. Which of the following measures would you recommend the company implement?
Principle of least privilege
After implementing several lockout policies, which type of password attack will these measures MOST effectively defend against?
Online attack
Which wireless security method relies on a shared key configured on both the wireless access point and all connected wireless devices?
WEP, WPA Personal, and WPA2 Personal
What should you implement to monitor and manage the risks of a BYOD policy?
Mobile device management
You are attempting to access a server within the company network from an external location using RDP, but your connection is unsuccessful. Which network device is your network administrator MOST likely required to adjust to enable this connection?
Firewall
After entering a user ID and password, an online banking user is required to input a PIN that was sent via text message to their mobile phone. Which digital security method does this process exemplify?
Multifactor authentication
You are the Active Directory administrator for a company with branch offices in multiple countries, including Mexico, Argentina, Canada, and the UK. Currently, the company has 250 employees organized by department, and it’s projected to grow rapidly over the next two years. You need to design a flexible organizational unit (OU) structure that can handle future growth without requiring frequent reorganization. Additionally, you want to easily assign rights to network resources based on departmental roles. What is a solution that BEST meets these needs?
Organize the OUs at the top level by office (country); then use group accounts to help control resource rights
Which security measure can be integrated with a motion sensor to enhance protection?
Lights
Which type of DoS attack exhausts the target’s resources by overloading a specific program or service?
Application layer
What is an example of a soft token?
Authentication app
You own a small startup with five employees, each with their own computer. Given the nature of your business, you don’t expect much growth in the next year or two. To keep costs low and simplify file sharing, internet access, printer access, and local network resources, which solution would be the BEST fit for your business?
A workgroup
Which authentication category does a username and password fall under?
Something you know
You have been tasked with investigating a recent cybersecurity breach. During your investigation, you found that the attacker exploited the login field to send commands to the server and stole user credentials from the database. Which type of attack did your client MOST likely experience?
SQL injection
A technician helps Tom, an employee in the sales department, gain access to the client database by granting him Administrator privileges. Later, Tom finds out that he can access the salaries in the payroll database. Which security principle was compromised in this situation?
Principle of lease privilege
What is the BEST describes authorization?
The resources that a user can access
In your new role as a junior network technician at the local hospital’s IT department, which user group should your account be assigned to in order to effectively troubleshoot network communication issues?
Network Configuration Operator
There are two primary types of firewalls you should know about. Which pertains to a network-based firewall?
Inspects traffic as it flows between networks
You have five salespeople in your office who often leave their laptops unattended on their desks in cubicles. You’re worried the potential for theft. What is the MOST effective method to secure these laptops and prevent them from being stolen?
Use cable locks to chain laptops to the desks.
Is it true or false that hard tokens provide protection even if they are lost of stolen?
False
Which encryption algorithm incorporates a base key, the MAC address of the wireless access point, and a unique packet serial number for every transmitted packet?
TKIP (Temporal Key Integrity Pool)