CISCO Cybersecurity Essentials v1.1 - Chapter 7 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are three types of power issues that a technician should be concerned about? (Choose three.) 1. Blackout 2. flicker 3. brownout 4. spike 5. spark 6. fuzzing

1. Blackout 3. brownout 4. spike

Which service will resolve a specific web address into an IP address of the destination web server? 1. ICMP 2. DHCP 3. NTP 4. DNS

4. DNS

Companies may have different operation centers that handle different issues with the IT operations. If an issue is related to network infrastructure, what operation center would be responsible? 1. NOC 2. SOC 3. HVAC 4. HR

1. NOC

A new PC is taken out of the box, started up and connected to the Internet. Patches were downloaded and installed. Antivirus was updated. In order to further harden the operating system what can be done? 1. Remove unnecessary programs and services. 2. Turn off the firewall. 3. Give the computer a nonroutable address. 4. Remove the administrator account. 5. Disconnect the computer from the network. 6. Install a hardware firewall.

1. Remove unnecessary programs and services.

A company wants to implement biometric access to its data center. The company is concerned with people being able to circumvent the system by being falsely accepted as legitimate users. What type of error is false acceptance? 1. Type II 2. CER 3. false rejection 4. Type I

1. Type II

The manager of desktop support wants to minimize downtime for workstations that crash or have other software-related issues. What are three advantages of using disk cloning? (Choose three.) 1. can provide a full system backup 2. creates greater diversity 3. easier to deploy new computers within the organization 4. ensures system compatibility 5. ensures a clean imaged machine 6. cuts down on number of staff needed

1. can provide a full system backup 3. easier to deploy new computers within the organization 5. ensures a clean imaged machine

A user calls the help desk complaining that an application was installed on the computer and the application cannot connect to the Internet. There are no antivirus warnings and the user can browse the Internet. What is the most likely cause of the problem? 1. computer firewall 2. corrupt application 3. permissions 4. need for a system reboot

1. computer firewall

Why is WPA2 better than WPA? 1. mandatory use of AES algorithms 2. reduced keyspace 3. supports TKIP 4. reduced processing time

1. mandatory use of AES algorithms

After a security audit for an organization, multiple accounts were found to have privileged access to systems and devices. Which three best practices for securing privileged accounts should be included in the audit report? (Choose three.) 1. No one should have privileged access. 2. Enforce the principle of least privilege. 3. Secure password storage. 4. Only managers should have privileged access. 5. Reduce the number of privileged accounts. 6. Only the CIO should have privileged access.

2. Enforce the principle of least privilege. 3. Secure password storage. 5. Reduce the number of privileged accounts.

The company has many users who telecommute. A solution needs to be found so a secure communication channel can be established between the remote location of users and the company. What is a good solution for this situation? 1. fiber 2. VPN 3. modem 4. T1 5. PPP

2. VPN

A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provide justification for the request. What three reasons can the user use to justify the request? (Choose three.) 1. the need for systems be directly connected to the Internet 2. no opportunities for users to circumvent updates 3. the likelihood of storage savings 4. the ability to obtain reports on systems 5. the ability to control when updates occur 6. the ability of users to select updates

2. no opportunities for users to circumvent updates 4. the ability to obtain reports on systems 5. the ability to control when updates occur

What is the difference between an HIDS and a firewall? 1. An HIDS works like an IPS, whereas a firewall just monitors traffic. 2. An HIDS blocks intrusions, whereas a firewall filters them. 3. An HIDS monitors operating systems on host computers and processes file system activity. Firewalls allow or deny traffic between the computer and other systems. 4. A firewall allows and denies traffic based on rules and an HIDS monitors network traffic. 5. A firewall performs packet filtering and therefore is limited in effectiveness, whereas an HIDS blocks intrusions.

3. An HIDS monitors operating systems on host computers and processes file system activity. Firewalls allow or deny traffic between the computer and other systems.

A user is asked to analyze the current state of a computer operating system. What should the user compare the current operating system against to identify potential vulnerabilities? 1. a pentest 2. a blacklist 3. a baseline 4. a whitelist 5. a vulnerability scan

3. a baseline

Why should WEP not be used in wireless networks today? 1. its use of clear-text passwords 2. its age 3. easily crackable 4. its lack of encryption 5. its lack of support

3. easily crackable

A user calls the help desk complaining that the password to access the wireless network has changed without warning. The user is allowed to change the password, but an hour later, the same thing occurs. What might be happening in this situation? 1. user error 2. password policy 3. rogue access point 4. weak password 5. user laptop

3. rogue access point

An intern has started working in the support group. One duty is to set local policy for passwords on the workstations. What tool would be best to use? 1. grpol.msc 2. password policy 3. secpol.msc 4. system administration 5. account policy

3. secpol.msc

Which three items are malware? (Choose three.) 1. Apt 2. attachments 3. virus 4. Trojan horse 5. Keylogger 6. email

3. virus 4. Trojan horse 5. Keylogger

A user is proposing the purchase of a patch management solution for a company. The user wants to give reasons why the company should spend money on a solution. What benefits does patch management provide? (Choose three.) 1. Patches can be chosen by the user. 2. Computers require a connection to the Internet to receive patches. 3. Patches can be written quickly. 4. Administrators can approve or deny patches. 5. Updates can be forced on systems immediately. 6. Updates cannot be circumvented.

4. Administrators can approve or deny patches. 5. Updates can be forced on systems immediately. 6. Updates cannot be circumvented.

An administrator of a small data center wants a flexible, secure method of remotely connecting to servers. Which protocol would be best to use? 1. Telnet 2. Secure Copy 3. Remote Desktop 4. Secure Shell

4. Secure Shell

The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.) 1. backup 2. password management 3. EFS 4. at least two volumes 5. USB stick 6. TPM

4. at least two volumes 6. TPM

The manager of a department suspects someone is trying to break into computers at night. You are asked to find out if this is the case. What logging would you enable? 1. Windows 2. syslog 3. operating system 4. audit

4. audit


Conjuntos de estudio relacionados

"Master Harold"...and the boys Reading Quiz #2

View Set

Chapter 3 - The Accounting Information Systems

View Set

MOC: exam 2 test bank questions

View Set

Adobe Illustrator CC Certification Vocabulary

View Set

Problem Solving with Systems Quiz

View Set

Chapter 6 Integumentary System A&P Mcgraw

View Set