CET215- Lesson 19 Security technologies (Quiz)
What command allows you to copy objects while preserving their existing permissions?
xcopy
James, a network administrator, wants to access his company's internal website from a remote location via a wireless Internet connection. Which type of connection does he need to make this secure?
VPN
What prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely?
VPN
The VPN protocols are managed either by software running on a host or router, or on a specialized hardware appliance known as ________.
VPN concentrator
Which of the following gpupdate tool options reapplies all policies, even those which haven't been changed?
/force
Which of the following port numbers is used by the Telnet protocol?
23
Which port needs to be opened on the firewall for DNS?
53
Andrew, a technician, is trying to manually migrate a user's profile from one Windows PC to another. Files in the user's folder cannot be copied. Which of the following file systems is causing this to occur?
EFS
Which Active Directory security feature is a single sign-on system that uses the common Internet standard SAML?
ADFS
Which protocol is used for accessing and maintaining distributed directory information services over an IP network?
LDAP
Which of the following Active Directory security features allows the Active Directory network to maintain a public key infrastructure?
Active Directory Certificate Services
Which of the following Windows security features will you use to access the stored user names, passwords, and certificates of your computer system?
Credential Manager
A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?
DLP
Which of the following is used to classify and protect the confidential and critical data of the organization?
DLP
You are working in an organization that uses the software which creates rules to prevent users from accidentally or maliciously sharing particular types of data outside your organization. What is the name of this software?
DLP
Which of the following NTFS permissions gives the read and write permissions to a user and allows the user to delete the folder?
Modify
John, a technician, wants to assign permissions to child objects that are different than their parents. After clicking on change permissions, what changes will he make in the Advanced Security Settings dialog box?
Disable the Include inheritable permissions from this object's parent checkbox.
You've assigned a task to give limited computer access to individuals without a user account. Which of the following accounts will you create?
Guest
Which file attribute suppresses the display of the file in directory lists?
Hidden
A company wants to ensure that its cloud infrastructure is secure as well as fully available. The company also wants to be alerted in the event of a security breach. Which of the following solutions would meet these requirements?
IDS
Maria, a network technician, has to implement a system that detects and reports attempts of unauthorized access to the network. Which of the following systems should she install?
IDS
Which of the following is a passive monitoring system designed to alert administrators when something suspicious happens, but take no action on their own?
IDS
Which of the following is used to monitor network traffic to look for signs of intrusion or other unwanted activities?
IDS
A network administrator must install a device that will proactively stop outside attacks from reaching the LAN. Which of the following devices would best meet the organization's needs?
IPS
Andrew, a network analyst, is tasked to provide security to the network traffic by ensuring data confidentiality, data integrity, sender and recipient authentication, and replay protection. Which of the following will help him accomplish the task?
IPSec
What is the function of a web application firewall (WAF)?
It evaluates rules based on higher level protocols used by web servers.
Which of the following allows you to define a list of devices and only allow those devices on your Wi-Fi network?
MAC Filtering
Which part of RADIUS is the device that users directly connect to that also relays all communication between users and the RADIUS server?
NAS
What monitors network traffic and restricts or alerts when unacceptable traffic is seen in the system?
NIDS
Which of the following is used to monitor and analyze network traffic to protect a system from network-based threats?
NIDS
Which of the following is used to restrict devices which connect to the network or to detect and block some attacks using spoofed MAC addresses?
Port security
Maria, a network administrator, wants to block the availability to nonwork-type websites. Which type of server should she use for this purpose?
Proxy server
Which security appliance intercepts and mediates communications between internal and external hosts on a network?
Proxy server
Which of the following authentication systems is used as the authentication back end for Wi-Fi networks using WPA Enterprise security?
RADIUS
A user has created a file in an NTFS folder with the Modify permission, which of the features are allowed with this permission?
Read, write, and delete
What is the purpose of the Archive (A) file attribute?
Specify that the file should be backed up.
Which of the following protocols handles authentication, authorization, and accounting services?
TACACS+
Which utility notifies you when an action will change Windows settings and gives you an option to stop?
UAC
James, a technician, wants to syndicate the security controls of some of the network devices in the company. His company does not have sufficient resources to manage its large infrastructure. Which of the following methods would best accomplish his goal?
UTM
Which Internet appliance will you install to manage all of the security-related hardware and software through a single device or interface?
UTM
Which of the following combines firewall, IPS, and anti-malware protection into one central management point?
UTM
Which of the following combines the features of a firewall, gateway anti-virus, and IDS/IPS into a single device?
UTM
Which Windows security feature notifies you when an action will change Windows settings and gives you an option to stop?
User Account Control
Which Windows security feature runs in the background to protect critical system files, folders, and registry keys from unplanned alterations?
Windows Resource Protection