CIS3003 - Section Quizzes Pt3

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following would be the BEST answer to the question, "What is your greatest weakness"?

"I lack patience but this is something I'm working on."

Which of the following certifications would you pursue to help you land a job as a network administrator?

Cisco CCNA

Which of the following future trends in Information Technology (IT) refers to an organization automating as many tasks as possible?

Hyper-automation

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Power outage

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again. Which of the following policies are BEST to configure? (Select TWO)

-Minimum password age -Enforce password history

The CEO of a small business travels extensively and is worried about having the information on their laptop stolen if the laptop is lost or stolen. Which of the following would BEST protect the data from being compromised if the laptop is lost or stolen?

Full disk encryption

Which of the following would be the BEST thing to do following an interview?

Send a thank you note

Speaking in front of a mirror can help to improve which of the following traits?

Social skills

What is the best countermeasure against social engineering?

User awareness training

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used?

Multifactor authentication

Sets expectations for user privacy when using company resources.

Acceptable Use Policy

An accountant needs to send an email with sensitive information to a client and wanted to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. Which of the following should the account use to send the email?

Cipher text

What is a disadvantage of using the cloud for data storage?

Cloud storage backups require a reliable internet connection

Which of the following is a common form of social engineering attack?

Hoax virus information emails

Which of the following personality traits means that you possess high moral character regardless of whether you're being watched by others?

Integrity

Which of the following should you do before going to an interview?

Research the company history and culture

How long should a good elevator pitch be?

30 seconds

Which of the following would be the BEST opinion to help you narrow down choices when identifying a career in IT?

Career Assessment Tests

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

Change the router's default password

Identifies a set of rules or standards that define personal behaviors.

Code of Ethics

Which of the following is a good general rule to go by when deciding what to wear to an interview?

Dress one step ABOVE what the position requires.

Once you've identified a specific IT career you'd like to pursue, which of the following can BEST help you create a career plan? (select two)

-Compare your current experience with job qualifications -Set clearly defined goals

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (select TWO)

-Keep the operating system up to date -Lock the screen with some form of authentication

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three unsuccessful logon attempts. Which of the following policies are BEST to configure? (Select TWO)

-Minimum password length -Account lockout threshold

The password policy below incorporates the following: -Passwords must include at least one capital letter -Passwords must include a mix of letters and numbers -Passwords must be different from the past eight passwords -Passwords must contain at least one non-alphanumeric character Which of the following password best practices are being users? (Select TWO)

-Password History -Password complexity

Making real and authentic connections with people is known as which of the following?

Networking

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

Non-repudiation

Provides a high-level overview of the organization's security program

Organizational Security Policy

Your company wants to use multifactor authentication. Which of the following would you most likely suggest?

PIN and smart card

Specifies that user accounts should be locked after a certain number of failed login attempts.

Password Policy

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon. Which of the following steps have you forgotten in your troubleshooting process?

Perform a backup

In which of the following should you expect some privacy?

Personally identifiable information entered into a human resource database.

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver?

Plain text

Which of the following future IT trends will require many data analysts who can collect data, decide which data is relevant, and make good decisions based on that data?

Predictive Healthcare

Which of the following would you do as a computer forensics expert?

Recover digital evidence, some of which may have been damaged or deleted from storage devices.

Which of the following disaster recovery concepts applies when a server needs to be online and accessible at all times?

Redundancy

Even if you perform regular backups, what must be done to ensure that you are protected against data loss?

Regularly test restoration procedures.

Which of the following access controls gives only backup administrators access to all servers on the network?

Role-based

Which of the following schools allows students to receive dedicated training for a specific career?

Technical College

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?

Zombie/botnet

Which of the following would best prevent an unauthorized person from remotely accessing your computer?

Firewall

You've just received an email message that indicates a new, serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source codes, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\ Systems32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. Based on the email message, which of the following are the next BEST actions to complete? (Select TWO)

-Run a full anti-malware son -Verify the information on well-known malicious code threat management Web sites.

How many pages should a resume be for someone looking for their first job?

1

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?

Accounting

Which of the following describes a Man-in-the-Middle attack?

An attacker intercepts communications between two network hosts by impersonating each host.

The process of proving the computer that you are who you say you are is called __________.

Authentication

What do biometrics use to perform authentication of identity?

Biological attributes

Dana has performed a transaction online. The transaction is recorded in a public database. Which IT trend was MOST LIKELY used?

Blockchain technology

Mary is interested in moving into a career as a penetration manager. Which of the following IT certifications should she pursue?

CEH

Which of the following is the most common type of resume?

Chronological

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely backup important data to the Cloud.

You work for a company that offers their services through the Internet. Therefore, it it critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next BEST step to perform?

Contain the problem

Why is it better to use a credit card than a debit card for online purchases?

Credit cards have better fraud protection

Forensics experts need to be thoroughly familiar with which of the following?

Data encryption methods, operating systems, and programming languages

Mark received an email from a software company claiming his account will be disabled soon. The emails contains several spelling errors, an attachment, and status he should open the attachment for further instructions. What should Mark do?

Delete the email without opening the attachment.

Ted, an employee in the Sales department has asked a coworker, Ann, in the Production department to update the product descriptions contained in a Sales document. Ann can open the file but, after making changes, can't save the file. Which of the following digital security methods is MOST likely preventing this?

Directory permission

In which of the following situations should you expect total privacy?

Financial transactions

Which of the following security measures is a form of biometrics?

Fingerprint scanner

Which Internet protocol is used to transmit encrypted data?

HTTPS

Which of the following BEST describes a system administrator?

He or she is typically responsible for securing networks and responding to intrusions in smaller organizations

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which of the following is the BEST action to take?

Ignore the paper and tell no one of its contents

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof sale.

A security analyst does which of the following?

Inspects the company's network for security breaches and recommends measures to prevent future attacks.

Steve has just installed a new thermostat in his home that allows him to monitor and adjust the temperature from his phone een while he's away. Which future IT trend is this part of?

Internet of Things (IoT)

Which of the following is the system administrator's MOST important task?

Monitoring and maintaining system security

A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?

Principle of least privilege

Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?

Prioritization

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened. Which of the following emails protocols is being used?

S/MIME

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SSL

Which of the following is not a form of biometrics?

Smart card

Unwanted, unsolicited emails containing advertisements, political rhetoric hoaxes, or scams are collectively known as ________.

Spam

Which type of college would you attend to earn a bachelor's degree?

University

You have purchased a new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Use data wiping software to clear the hard drives

A technician is tasked to configure a mobile device to connect securely to the company network when the device is used to offsite locations where only internet connectivity is available. Which of the following should the technician configure?

VPN

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?

VPN

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used?

WPA2

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

WPA2 and AES

Which software is Microsoft's anti-malware product that is preinstalled on most new computers?

Windows Defender


Conjuntos de estudio relacionados

NWM Guaranteed Exam Health and Life

View Set

Gerontology individual and family well being "adult"

View Set

Postwar America Topic 8 Assessment

View Set

Lesson 1 Multiplication & Division Flashcards 1-10

View Set

Introduction to Computer Hardware and Software

View Set

NSG 242 Chapter 31: Health Supervision

View Set

Unit 4 Chapter 3: Measuring Earthquake Magnitude

View Set