Security (2) Flashcards

1
Q

You need to run a command from the Windows command line as administrator. Which of the following methods will enable you to do this?

Enter your user name and account when prompted

Open the command prompt as sudo

Right-click cmd.exe and select Run as administrator

A

Right-click cmd.exe and select Run as administrator

To run command prompt commands as administrator, you must open the command prompt session as administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A folder is configured with Full Control settings. However, there’s a file in that folder that you want to make read-only. Which of the following would work?

Change the security setting for the file to Read-only

Move the file to a different folder at the same level as the current folder and set the folder as Read-only

Use attrib

A

Move the file to a different folder at the same level as the current folder and set the folder as Read-only

The parent folder permissions override the settings for a specific file in the folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You want to view a file in a folder. Which of the following permissions is needed?

List Folder Contents

Modify

Read & Execute

A

List Folder Contents

List Folder Contents will allow you to view the files in the folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ou have a SOHO workgroup at home but connect to a domain controller at the office. Your spouse wants to access a shared folder on your computer. Which of the following do you need to do?

Send a request to the domain administrator

Run BitLocker

Set up an account for your spouse on your computer

A

Set up an account for your spouse on your computer

You control sharing on your workgroup, so you can make these changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your computer is called \MyPC. Your spouse’s computer is called \TheOtherPC. To log in to the administrative share on your spouse’s C: drive, which of the following is the correct syntax?

\TheOtherPC$C

\TheOtherPC\DriveC$

\TheOtherPC\C$

A

\TheOtherPC\C$

The correct syntax includes the remote computer name and the administrative share name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are considering using one of the following eight-character passwords. Which is the strongest password?

12345678

1Z$#7j!~

867530900

A

1Z$#7j!~

The strongest passwords use a mixture of upper- and lower-case letters, numbers, and symbols without recognized words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your client is being plagued by a series of brute-force logon attacks. Which of the following group policy settings would best help stop them?

Account Lockout Policy

Security Options

Password Policy

A

Account Lockout Policy

The Account Lockout Policy prevents login attempts after a specified number of incorrect logins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user in your department is going on leave for six months. You don’t want this user to have access to network resources while on leave. What should you do with their account?

Delete it

Take no action

Disable it

A

Disable it

Disabling an Active Directory account prevents logins by that user while not disrupting security or other settings involving that user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your department was recently attacked by malware that was automatically loaded from a consultant’s USB drive when it was inserted for diagnostic purposes. Which of the following needs to be disabled?

AutoRun

Explorer

AutoPlay

A

AutoPlay

AutoPlay is the feature that opens an app or lists a choice of apps based on the contents of the removable media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Some of the computers in the organization need to use BitLocker. Which of the following is the correct path in group policy to configure BitLocker settings?

User Configuration | Administrative Templates | Control Panel | BitLocker Drive Encryption

Computer Configuration | Administrative Templates | Windows Components | BitLocker Drive Encryption

Computer Configuration | Administrative Templates | Windows Components | BitLocker Policies

A

Computer Configuration | Administrative Templates | Windows Components | BitLocker Drive Encryption

BitLocker Drive Encryption is a Windows component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An Android phone with confidential company information was lost. The information on the phone began to be used for attacks on company resources, although the user had set up a passcode. Which of the following Android settings could have prevented attacks using the information in the phone? (Choose all that apply.)

Remote wipe

Firewall

Device encryption

BYOD

A

Remote wipe

Device encryption

Remote wipe could wipe out the device’s contents after it was determined to be lost or stolen; device encryption (a manual process on many devices) could prevent the device’s contents from being accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your company policy for mobile devices prohibits the use of untrusted software sources. Which of the following sources would be prohibited?

App store

Freeware website

Vendor-supplied utilities

A

Freeware website

Freeware websites might have software that has been compromised with hidden malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You receive a message on your smartphone that someone is attempting to log in to your e-mail from an unrecognized device. You are asked to approve or deny it. This is an example of which type of security mechanism?

Multifactor authentication

Trusted source

Single-factor authentication

A

Multifactor authentication

Multifactor authentication is being used because an additional confirmation beyond user name/password is needed to permit access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your client is very forgetful, and while away from home is trying to log in to her iPhone. The client has tried eight times already to log in and is frustrated because it takes longer between login attempts each time. What should you advise her to do?

Keep trying to log in

Stop trying until she can get back home and check to see if she has the information available there

Use a hacking tool

A

Stop trying until she can get back home and check to see if she has the information available there

If the option to wipe data after ten unsuccessful logins has been enabled in Settings | Passcode, the user is very close to losing her data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are part of a team developing a BYOD policy for smartphone usage. Which of the following topics are most likely to be part of the policy? (Choose two.)

Approved case colors

Company reimbursement for mobile service charges

Ownership of charging cables

Ownership of data stored on device

A

Company reimbursement for mobile service charges

Ownership of data stored on device

Deciding who pays for mobile service and who owns the data on a BYOD device are typical issues in a BYOD policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A 64-GB flash memory card contains confidential information. Which of the following methods assures that data cannot be read from the card (which will not be reused)?

Drill

Zero-fill

Drive wiping

A

Drill

Drilling through the memory chip(s) will render the contents unrecoverable

17
Q

After the completion of a government contact, your firm must prove that the media used to store data have been destroyed. Which of the following do you need?

Drill/hammer

Certificate of destruction

Shredder

A

Certificate of destruction

A certificate of destruction from a third-party data destruction facility is what you need; the facility will decide the best methods and tools to use

18
Q

Your client is panicking because a disgruntled employee performed some type of command on an important hard drive before leaving the premises. Which of the following would make the data the most difficult to recover?

Standard format

Zero-fill

Drive wiping

A

Drive wiping

Drive wiping would be the biggest concern

19
Q

You are in charge of a project to remove hard drives from end-of-life systems and prepare them for donation to schools for reuse. You discover that one of your assistants is running the Format command on each drive before removing it. Which of the following is the best reaction to this discovery?

“Good job! No one can get to that data now.”

“Did you use quick or standard format?”

“Using Format isn’t drive wiping.”

A

“Using Format isn’t drive wiping.”

Formatting doesn’t remove or overwrite data, so it is no substitute for drive wiping

20
Q

Your firm has a large amount of magnetic tape from old mainframe systems. Which of the following is the quickest way to render this tape unreadable?

Zero-fill

Drive wiping

Degaussing

A

Degaussing

Degaussing is the only suitable method of those listed for destroying data on magnetic tape

21
Q

The default SSID for a SOHO router can be used to look up which of the following? (Choose all that apply.)

Brand and (sometimes) model

Default administrator name and password

Location

Default encryption

A

Brand and (sometimes) model

Default administrator name and password

Default encryption

Documentation for a typical SOHO router lists its default SSID, and from this the other information can be found

22
Q

WPS is easy to use. Which of the following terms best describes its other features?

Secure

Vulnerable

Recommended

A

Vulnerable

Wi-Fi Protected Setup (WPS) is very vulnerable to hacking, so it is not recommended

23
Q

Which of the following programs are you most likely to use when you set up your SOHO router?

Web browser

Paint program

FTP program

A

Web browser

A web browser is the standard method for configuring and managing a router’s settings

24
Q

You need to set up your router to open a certain range of ports based on outgoing traffic. What is this feature known as?

Port forwarding

Disabling ports

Port triggering

A

Port triggering

Port triggering changes the setting for some ports depending on traffic to other ports

25
Q

Because you live in an apartment building, you would like to adjust the power of your router’s Wi-Fi radio. You’ve heard it’s possible, but you can’t find any setting for it when you log in to your router. After updating your firmware, you’re still coming up empty-handed. What should you try next?

Replacing the router as defective

Buying a different router

Researching third-party firmware

A

Researching third-party firmware

Third-party firmware often makes “hidden” features available