Ch-9 Mobile Devices
You are configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following IP ports should you open on the firewall? (Select TWO).
-110 -25
Which of the following features is supplied by WPA2 on a wireless network? (Select TWO).
-Authentication -Encryption
Which of the following functions are performed by proxy servers? (Select TWO).
-Block employees from accessing certain websites -Cache web pages
You are configuring the local security policy of a windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which of the following policies are best to configure? (Select TWO).
-Minimum password legnth -Account lockout threshold
Following your windows installation, you enabled the built-in administrator account. You remove the password for this account. You enable remote desktop on your computer using the default settings. From home, you try to access your computer using remote desktop using the administrator account, but you are unable to login. Which of the following must be completed before you can access your computer using remote desktop?
Configure a password for the administrator account
You want to configure your computer so that a password is required before the operating system will load. What should you do?
Configure a user password in the BIOS/UEFI
Which of the following measures will make your wireless network less visible to the causal attacker?
Disable SSID broadcast
A technician upgrades the hard drive on a computer in the accounting department and decides to donate the old drive to a local trade school. Which of the following is the best method to ensure that the accounting data can't be recovered?
Drive wipe
A technician wants to destroy the data on a hard drive and repurpose it as a spare drive. Which of the following data destruction methods allow the reuse of the hard drive?
Drive wipe
An employee working from home accesses the company network using a VPN connection. When connecting, the employee is prompted for a PIN that changes at predetermined intervals. Which of the following will the employee most likely use to obtain the PIN?
Key fob
While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy backing to gain access to your building. The individual in question did not have a security badge. Which of the following would you most likely implement to keep this from happening in the future?
Mantraps
During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display?
Privacy filter
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
PPTP
Which of the following is a firewall function?
Packet filtering
An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would most likely provide this service?
Proxy server
Which of the following is not a form of biometrics?
Smart card
Which of the following security technologies stores identification in a magnetic strip, radio frequency transmitter, or hardware contact to authorize access to a computer?
Smart card
Joe, an executive, receives an email that appears to be from the financial institution that provides his company credit card. The text of the email includes Joe's name and the company name and states that there is a problem with Joe's credit card. The email provides a link to verify the credit card, but when Joe hovers over the link, he thinks the web address seems strange. Which of the following best describes this type of attack?
Social engineering
A security incident is currently occurring on the company network. You discover that the attack involves a computer system that is attached to the network. You're unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take first?
Stop the attack and contain the damage by disconnecting the system from the network.
You are a security consultant. An organization has hired you to review their security measures. The organization is chiefly concerned that it could become the victim of a social engineering attack? Which of the following actions would you most likely recommend to mitigate the risk?
Teach users how to recognize and respond to social engineering attacks.
Which security measure can be used to generate and store cryptographic keys?
Trusted Platform Module (TPM)
While trying to log on, a user accidentally typed the wrong password three times, and now the system is locked because he entered too many incorrect passwords. He still remembers his password, but he just typed it wrong. He needs access as quickly as possible. Which of the following would allow the user to log on?
Unlock the account
You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps must be completed prior to getting rid of the computers?
Use data wiping software to clear the hard drives
Which of the following is an example of strong password?
a8bT11$yi
A user stores sensitive data on a USB flash drive. Which of the following can be used to encrypt that data on this drive?
Bitlocker to go
A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware corrupted the boot block. Based on your suspicious, which of the following actions would you most likely take to correct the problem? (Select TWO.)
-Boot from the windows installation DVD and use the recovery environment to run a startup repair. -Reimage the machine
Which of the following are likely symptoms of malware infection? (Select two).
-Changed file permissions -Renamed system files
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using wi-fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public wi-fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take when implementing this configuration? (Select TWO. Each option is part of the complete solution.)
-Configure the browser to send HTTPS requests through the VPN connection -Configure the VPN connection to use IPsec
Joe, a bookkeeper, works in a cubicle enviroment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. Which of the following are the best solutions for securing Joe's workstation? (Select TWO).
-Configure the screen lock to be applied after short period of nonuse. -Configure the screen saver to require a password
A small company hires a technician to review their wireless security. The technician discovers that the wireless signal is available outside of the building. Which of the following could the technician recommend to correct this problem? (Select TWO).
-Decrease radio power levels -Implement a directional antennae
You provide desktop support at the branch office of a bank. One of the windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. A cable lock has been installed to prevent it from being stolen. Which of the following steps could be completed to BEST increase the security of this system? (Select TWO).
-Disable all USB ports in the BIOS/UEFI firmware configuration -Remove the optical drive
One of the windows workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (Your account) is an administrative user. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would most likely increase the security of this system? (Select TWO).
-Disable autorun on the system -Set a screensaver password
A small business named Widgets, INC has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following:using a wireless network locator device: -They user an 802.11n wireless network -The wireless network is broadcasting the SID Linksys -The wireless network uses WPA2 with AES security -Directional access points are positioned around the periphery of the building. Which of the following would you most likely recommend your client do to increase their wireless network security? (Select TWO).
-Disable the SSID broadcast -Change the SSID to something other than the default
You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass though a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations are you most likely to make to this organization to increase their security? (Select TWO).
-Disable the network jacks in the reception area -Train the receptionist to keep her iPad in a locked drawer when not in use.
Which of the following are examples of social engineering? (Select TWO).
-Dumpster diving -Shoulder surfing
What are the most common means of virus distribution? (Select TWO).
-Email -Malicious websites
You are configuring the local security policy of a windows system. You want to prevent users from reusing old password. You also want to force them to use a new password for at least five days before changing it again. Which of the following policies are best to configure? (Select TWO).
-Enforce password history -Minimum password age
Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select TWO).
-Exploiting DHCP servers to deliver the IP address of poisoned DNS servers -Changing the hosts file of a user's computer
Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select THREE).
-IPSec -PPTP -L2TP
You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would most likely increase the security of this system? (Select TWO. Each option is a complete solution.)
-Install a privacy filter on the monitor -Secure the computer system to the desk with a cable lock
Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select TWO).
-L2TP -PPTP
Match each security policy on the left with the appropriate description on the right. Each security policy may be used once, more than once, or not at all. Provides a high-level overview of the organization's security program -Defines an employee's rights to use company property. -Identifies the requirements for credentials used to authenticate to company-owned systems. -Identifies a set of rules or standards that define personal behaviors. Sets expectations for user privacy when using company resources. -Specifies that user accounts should be locked after a certain number of failed login attempts.
-Organizational security policy -Acceptable use policy -Password policy -Code of ethics -Acceptable use policy -Password policy
Anna, a home user, employs a technician to check the security on a computer that was hacked. The technician discovers that the user's password is the name of Ann's dog and hasn't been changed over a year. Which of the following security best practices should the technician recommend? (Select TWO).
-Require a strong password -Set a password expiration period
Which are examples of strong passwords? (Select TWO).
-TuxP3nguinsRn0v3l -il0ve2eaticecr3am
While browsing the internet, a pop-up browser window is displayed warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the best actions to take? (Select TWO).
-Update the virus definitions for your locally-installed-anti-malware software -Run a full system scan using the anti-malware software installed on your system.
You have just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. Which of the following steps will best protect the wireless network> (Select TWO. Each option is a complete solution.)
-Use the WAP's configuration utility to reduce the radio signal strength. -Configure the WAP to filter out unauthorized MAC addresses.
Which of the following statements about a SSL VPN are true? (Select TWO).
-Uses port 443 -Encrypts the entire communication session
To access your company's internal network from home, you use Secure Shell (SSH). The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home?
22
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the internet, but you are unable to perform secure credit card transactions when making purchases from e-commerce websites. Which port needs to be enabled to allow secure transactions?
443
A public library has purchased a new laptop computer to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should be used to physically secure the laptop?
A cable lock
What is a cookie?
A file saved on your hard drive that tracks websites preferences and use
A technician is tasked with installing a network-enabled camera that runs on power that is supplied through its network connection. The network device that connects to the camera does not have the capability to supply this power. There is a power outlet close to the camera. Which of the following device can be used to supply power?
A power over Ethernet injector
While browsing the Internet, you notice that the browser displays pop-ups containing advertisements that are related to recent keyword searches you have performed. What is this an example of?
Adware
Alice has received several calls from her friends informing her that they are receiving strange emails containing content that seems odd coming from her. Which of the following most likely happened on Alice's computer?
Alicie's email account was hijacked
Which of the following security practices are the best example of least privilege?
All users on a windows workstation are limited users except for one user, who is responsible for maintaining the system.
Which of the following describes a man-in-the-middle attack?
An attacker intercepts communication between the two network hosts be impersonating each hosts
Bob calls and complains that he has suddenly started getting a lot of unwanted email. Which of the following is the best type of software to install to help solve Bob's problem?
Anti-spam
Which of the following is an important aspect of evidence gathering?
Backing up all log files and audit trails.
What do biometrics use to authenticate identity?
Biological attributes
Employees currently access a data center using RFID badges. The company is concerned that an unauthorized person could gain access using a lost or stolen badge. Which of the following could be implemented to increase the physical security?
Biometric locks
You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which of the following is the best method for achieving your goals?
Bitlocker
Your anti-malware software has detected a virus on your Windows 10 system. However, the anti-malware software is unable to remove it. When you try to delete the files, you can't because they are in use. Which of the following actions would be best to try first?
Boot into safe mode and try removing the malware
You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this?
Chain of custody
You've just finished installing a wireless access point for a client. Which action best predicts the access point from unauthorized tampering with its configuration settings?
Changing the default administrative password
Which of the following indicates that a system case cover has been removed?
Chassis intrusion detection
Jose, a medical doctor, has a mobile device that contains sensitive patient information. He is concerned about unauthorized access to the data if the device is lost or stolen. Which of the following is the best option to prevent this from happening?
Configure the device to remote wipe as soon as it is reported lost
You need to configure a windows workstation with the IP address of the proxy server for your network. Click the tab in the internet properties window that you would use to do this.
Connections
You work for a company that offers their services through the internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial of service attack. As a first responder, which of the following is the next best step to perform?
Contain the issue
Which of the following functions are performed by the TPM?
Create a hash based on installed computer components.
Employees in a small business have a habit of transferring files between computers using a USB flash drive and often bring in files from outside the company. Recently, a computer was infected with malware from a USB flash drive even though the employee did not access any files. Which of the following options would prevent this issue in the future?
Disable autorun
You just bough a new notebook. The system uses UEFI firmware and came with windows 10 preinstalled. However, you want to use Linux on this system. You download your favorite distribution and install it on the system, removing all windows partitions on the hard disk in the process. When the installation is complete, you find that the operating system won't load when the system is rebooted. Which of the following would allow your computer to boot to Linux?
Disable secureboot in the UEFI configuration
Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following: * Server systems are kept in a locked server room * User accounts on desktop systems have strong passwords assigned * A locked door is used to control access to the work area. Users must use ID badges to enter the area * Users connect their personal mobile devices to their computers using USB cables * Users work in three 8-hour shifts per day. Each computer is shared by three users. Each user has a limited account on the computer they use Based on this information, what should you recommend your client do to increase security?
Disable the USB ports on user's workstations
One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allows management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been disabled on the system. Autorun has been disabled on the system. Which of the following actions is most likely to increase the security of this system?
Disable the guest account
You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations would you most likely make to this organization to increase their security?
Disable the switch ports connected to the network jacks in the reception area
A technician was able to stop a security attack on a user's computer. When conducting a forensic investigation, which of the following actions should be performed first?
Document what's on the screen
A user has a file that contains sensitive data. Which of the following can be used to encrypt a single file?
EFS
Which of the following security solutions would prevent a user from reading a file which she did not create?
EFS
A company has chosen a UTM instead of an IDS or IPS appliance to protect their network. Which of the following UTM security features is not available with an IDS or IPS?
Email and anitspam filtering
Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?
Email filtering
Which type of biometric authentication uses the ridges of your skin?
Fingerprint
Which of the following security measures is a form of biometrics?
Fingerprint scanner
A user can't make an RDP connection from outside the network to a server inside the network. Which network device will a network administrator most likely configure to allow this connection?
Firewall
Which of the following is the best device to deploy to protect your private network from a public, untrusted network?
Firewall
For some time now, you have been using an application on your windows 10 computer at home and while in the office. This application communicates with the internet. Today, your team lead decided to have a special team meeting at a local hotel. During this meeting, you obtained access to the internet using the hotel's network, but when you tried to run your application, it could not communicate with the internet. Which of the following control panel settings is most likely causing this behavior?
Firewall settings
The TCP/IP session state between two computers on a network is being manipulated by an attacker such that she is able to insert tampered packets into the communication stream. Which of the following best describes the type of attack which as occurred in this scenario?
Hijacking
Which of the following protocols provides authentication and encryption services for VPN traffic?
IP sec
Two employees are unable to access any websites on the internet, but can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following would best resolve this issue?
Identify the proxy server name and port number in internet options
Your organization is frequently visited by sales reps. While on-site, they frequently plug their notebook systems into any available wall jack, hoping to get internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. Which of the following would best protect you from guest malware infection> (Select TWO).
Implement MAC address filtering -Implement static IP addressing
A local dentist has contracted you to implement a network in her new office. *No one from the Internet should be able to access her internal network. *Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. *Employees should be blocked from accessing non-work related web sites, especially sites that contain inappropriate content. *A system should be put in place to detect and prevent external attacks on her network. Which of the following would best meet your client's criteria
Implement an all-in-one security appliance
A small business named BigBikes, INC has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following: -They use an 802.11a wireless network -The wireless network SSID is set to BWLAN -The wireless network is not broadcasting the network SSID -The wireless network uses WPA2 with AES security -Omnidirectional access points are positioned around the periphery of the building. Which of the following would you most likely recommend your client do to increase their wireless network security?
Implement directional access points
You have implemented a regular backup schedule for a windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?
In a locked fireproof safe
You would like to control Internet access based on users, time of day, and Web sites visited. Which of the following actions would best meet your criteria?
Install a proxy server. Allow internet access only through the proxy server
You have recently had an issue where a user's windows computer was infected with a virus. After removing the virus from the computer, which of the following is the next step you should take?
Install all OS updates
You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. Which of the following best describes what happened to the file?
It has been moved to a folder on your computer
Which of the following best describes spyware?
It monitors the actions you take on your machine and sends the information back to its originating source.
A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following best describes the type of attack that just occurred?
Masquerading
Which of the following network devices or services is least likely to be compatible with VPN connections?
NAT
What is the least secure place to locate an omnidirectional access point when creating a wireless network?
Near a window
A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small middle eastern nation. The user has offered a 25% share of this account if she would help the sender transfer it to a bank in the united states. The user responded and was instructed to wire $5,000 to the sender to facilitate the transfer. She complied, but has not heard from the sender once. Which of the following best describes the type of attack which occurred in this scenario?
Nigerian 419 scam
You want to be able to access your home computer using remote desktop while traveling. You enable remote desktop, but you find that you cannont access your computer outside of your home network. Which of the following is the best solution to your problem?
Open the firewall port for the remote desktop protocol
A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small Middle Eastern nation. The user was offered a 25 percent share of this account if she would help the sender transfer it to a bank in the United States. The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used that information to drain her bank account. What type of attack occurred in this scenario?
Phishing
Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL. Which of the following security threats does this describe?
Phishing
Several users have forwarded you an email stating that your company's health insurance provider has just launched a new website for all employees. To access the site, they are told to click a link in the email and provide their personal information. Upon investigation, you discover that your company's health insurance provider did not send this email. Which of the following best describes the type of attack that just occurred?
Phishing
Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?
Phishing
You have purchased new computers and will be disposing of your old computers. These computers were previously used for storing highly-sensitive customer order information, including credit card numbers. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?
Physically destroy the hard drives with a hammer
A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?
Principle of least privilege
You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the windows system file checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the best step that should be taken?
Quarantine Vivian's computer
Which of the following is the process of fixing problems detected by anti-virus software so that the computer is restored to its original state?
Remediation
You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a password set on the BIOS. You need to clear the password so that you can edit the CMOS settings. What should you do?
Remove the motherboard battery for a few seconds
The chain of custody is used for what purposes?
Retaining evidence integrity by identifying people coming into contact with evidence
Some software on Rachel's computer is telling her that the computer is at risk and that she needs to purchase an upgrade for the software before the risk can be removed. Confused, Rachel calls you (The IT Specialists) for advice. After meeting with Rachel, you discover that the pop-up warnings only began after she installed a plug-in for her internet browser. Which of the following is the most likely cause of these warning messages?
Rogue antivirus
You have a computer that runs windows 10. Where would you go to verify that the system has recognized the anti-malware software installed on the system?
Security and maintenance
Which of the following are common forms of social engineering attacks?
Sending hoax virus information emails
A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. Which of the following is most likely causing the problem?
She has enabled num lock, causing numbers to be sent from the keyboard instead of letters
While organizing a storage cabinet, a technician discovers a box of hard drives that are incompatible with current hardware and may contain sensitive data. Which of the following is the best method for disposing of these drives?
Shredding
You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to best prevent extracting data from the discs?
Shredding
A security technician is conducting a forensic analysis. Which of the following actions is most likely to destroy critical evidence?
Shutting down the system
Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?
Spamming
A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet. Which of the following best describes the type of attack which as occurred in this scenario?
Spoofing
A VPN is primarily used for what purpose?
Support secured communications over an untrusted network
A VPN is used primarily for what purpose?
Support secured communications over an untrusted network.
An intruder waits near an organization's secured entrance until an employee approaches the entrance and unlocks it with a security badge. The intruder falls in line behind the employee, who assumes the intruder is another employee and holds the door open for her.Which of the following best describes the type of attack that just occured?
Tailgating
An unauthorized person gains access to a secured area by following an authorized person through a door controlled by a badge reader.
Tailgating
You connect your computer to a wireless network available at the local library. You find that you can't access several websites you need to on the internet. Which of the following is the most likely cause of this problem?
The proxy server is filtering access to websites
You just bought a new computer. The system uses UEFI firmware and comes with windows 10 preinstalled. You recently accessed the manufacturer's support website and saw that a UEFI firmware update has been released. You download the update. However, when you try to install the update, an error message is displayed that indicates the digital signature on the update file is invalid. Which of the following is most likely caused this to happen?
The update file has been tampered with
What is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously?
Trojan
Which of the following components is a special hardware chip included on the computer motherboard that contains software in firmware that generates and stores cryptographic keys?
Trusted platform module (TPM)
You manage two computers with the following user accounts: * Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does. * Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not You are working from Wrk2 and would like to access a shared folder on Wrk1. Which of the following credentials would best allow you to access the shared folder?
Type 'admin' for the username and specify the password
You have 5 sales persons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of those these laptops. Which of the following is the best protection to implement to address your concerns?
Use cable locks to chain the laptops to the desks
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
What is the best countermeasure against social engineering?
User awareness training
Which of the following is the most common form of authentication?
Username and password
While on a business trip, an employee accesses the company's internal network and transfer files using an encrypted connection. Which of the following digital security methods is being used?
VPN
Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be best to implement?
VPN connector
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?
Virus
Which of the following is the most secure security protocol for wireless networks?
WPA2
Which of the following provides the best security for wireless networks?
WPA2
You are configuring a firewall to allow access to a server hosted in the demilitarized zone of your network. You open IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server?
Web server and email server
Which of the following forms of networking is highly susceptible to eavesdropping (Data interception) and must be secured accordingly?
Wireless
A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?
Zombie/botnet
You are responsible for disposing of several old workstations formerly used by accountant s in your organization's finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. TO do this, you use the windows XP installation CDs that came with these systems to delete all partitions from the hard drives. Which of the following best describes state of these systems?
You should use disk wiping software to fully erase the drives.
In which of the following situations should you install a firewall?
You want to restrict internet users from accessing private data on your network