Session 4 Flashcards
Which items need to be updated regularly in an antivirus software program?
Choices: A - Definitions B - Drivers C - Policies D - Programs
A - Definitions
Which three items help protect against unwanted software installations?
Choices: A - Third-party restriction software B - Adware C - Device Guard D - Single-factor authentication E - Group Policy
A - Third-party restriction software
C - Device Guard
E - Group Policy
Which item helps prevent potentially harmful programs from making changes to a user’s computer?
Choices: A - User Account Control B - Antivirus software C - Encryption tab D - Device-guard
A - User Account Control
In the business environment, antivirus software needs to be installed at the __________ level in order to best protect clients from bad email.
Choices: A - user B - client C - micro server D - server
D - server
Which are antispam tools? Choose two answers.
Choices: A - CRL B - DNSBL C - RBL D - AL E - ACL
B - DNSBL
C - RBL
Disguising a malicious email with a legitimate email address is called __________.
Choices: A - spoofing B - phishing C - whaling D - smurfing
A - spoofing
Which record type is useful for filtering out spam?
Choices: A - DSN ERC B - DNS PTR C - SLA DNS D - NLS PRT
B - DNS PTR
Which two tools can be used to effectively defend against phishing?
Choices: A - FormMail B - User education C - Docker swarm D - ListServ E - SmartScreen filtering
B - User education
E - SmartScreen filtering
Misdirecting users to fraudulent websites without their knowledge or consent is known as __________.
Choices: A - pharming B - smurfing C - phishing D - whaling
A - pharming
Which email validation system allows administrators to specify which machines are authorized to transmit email from a domain?
Choices: A - Threat Description Framework B - Sender Policy Framework C - Risk Policy Framework D - Object Sender Framework
B - Sender Policy Framework
Which is one way to get server updates?
Choices: A - Use a WSUS server B - Use a RODC server C - Use a WCCS database D - Use a NECC database
A - Use a WSUS server
Which three protocols should be disabled due to a lack of encryption?
Choices: A - FTP with passwords B - Anonymous FTP C - PAP D - Telnet E - SFTP
A - FTP with passwords
C - PAP
D - Telnet
Which item should be installed after installing a domain controller in a branch office in order to secure its information?
Choices: A - OSP B - NVHS C - DSRM D - RODC
D - RODC