CET215- Lesson 19 Security technologies (Quiz)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What command allows you to copy objects while preserving their existing permissions?

xcopy

James, a network administrator, wants to access his company's internal website from a remote location via a wireless Internet connection. Which type of connection does he need to make this secure?

VPN

What prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely?

VPN

The VPN protocols are managed either by software running on a host or router, or on a specialized hardware appliance known as ________.

VPN concentrator

Which of the following gpupdate tool options reapplies all policies, even those which haven't been changed?

/force

Which of the following port numbers is used by the Telnet protocol?

23

Which port needs to be opened on the firewall for DNS?

53

Andrew, a technician, is trying to manually migrate a user's profile from one Windows PC to another. Files in the user's folder cannot be copied. Which of the following file systems is causing this to occur?

EFS

Which Active Directory security feature is a single sign-on system that uses the common Internet standard SAML?

ADFS

Which protocol is used for accessing and maintaining distributed directory information services over an IP network?

LDAP

Which of the following Active Directory security features allows the Active Directory network to maintain a public key infrastructure?

Active Directory Certificate Services

Which of the following Windows security features will you use to access the stored user names, passwords, and certificates of your computer system?

Credential Manager

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?

DLP

Which of the following is used to classify and protect the confidential and critical data of the organization?

DLP

You are working in an organization that uses the software which creates rules to prevent users from accidentally or maliciously sharing particular types of data outside your organization. What is the name of this software?

DLP

Which of the following NTFS permissions gives the read and write permissions to a user and allows the user to delete the folder?

Modify

John, a technician, wants to assign permissions to child objects that are different than their parents. After clicking on change permissions, what changes will he make in the Advanced Security Settings dialog box?

Disable the Include inheritable permissions from this object's parent checkbox.

You've assigned a task to give limited computer access to individuals without a user account. Which of the following accounts will you create?

Guest

Which file attribute suppresses the display of the file in directory lists?

Hidden

A company wants to ensure that its cloud infrastructure is secure as well as fully available. The company also wants to be alerted in the event of a security breach. Which of the following solutions would meet these requirements?

IDS

Maria, a network technician, has to implement a system that detects and reports attempts of unauthorized access to the network. Which of the following systems should she install?

IDS

Which of the following is a passive monitoring system designed to alert administrators when something suspicious happens, but take no action on their own?

IDS

Which of the following is used to monitor network traffic to look for signs of intrusion or other unwanted activities?

IDS

A network administrator must install a device that will proactively stop outside attacks from reaching the LAN. Which of the following devices would best meet the organization's needs?

IPS

Andrew, a network analyst, is tasked to provide security to the network traffic by ensuring data confidentiality, data integrity, sender and recipient authentication, and replay protection. Which of the following will help him accomplish the task?

IPSec

What is the function of a web application firewall (WAF)?

It evaluates rules based on higher level protocols used by web servers.

Which of the following allows you to define a list of devices and only allow those devices on your Wi-Fi network?

MAC Filtering

Which part of RADIUS is the device that users directly connect to that also relays all communication between users and the RADIUS server?

NAS

What monitors network traffic and restricts or alerts when unacceptable traffic is seen in the system?

NIDS

Which of the following is used to monitor and analyze network traffic to protect a system from network-based threats?

NIDS

Which of the following is used to restrict devices which connect to the network or to detect and block some attacks using spoofed MAC addresses?

Port security

Maria, a network administrator, wants to block the availability to nonwork-type websites. Which type of server should she use for this purpose?

Proxy server

Which security appliance intercepts and mediates communications between internal and external hosts on a network?

Proxy server

Which of the following authentication systems is used as the authentication back end for Wi-Fi networks using WPA Enterprise security?

RADIUS

A user has created a file in an NTFS folder with the Modify permission, which of the features are allowed with this permission?

Read, write, and delete

What is the purpose of the Archive (A) file attribute?

Specify that the file should be backed up.

Which of the following protocols handles authentication, authorization, and accounting services?

TACACS+

Which utility notifies you when an action will change Windows settings and gives you an option to stop?

UAC

James, a technician, wants to syndicate the security controls of some of the network devices in the company. His company does not have sufficient resources to manage its large infrastructure. Which of the following methods would best accomplish his goal?

UTM

Which Internet appliance will you install to manage all of the security-related hardware and software through a single device or interface?

UTM

Which of the following combines firewall, IPS, and anti-malware protection into one central management point?

UTM

Which of the following combines the features of a firewall, gateway anti-virus, and IDS/IPS into a single device?

UTM

Which Windows security feature notifies you when an action will change Windows settings and gives you an option to stop?

User Account Control

Which Windows security feature runs in the background to protect critical system files, folders, and registry keys from unplanned alterations?

Windows Resource Protection


Ensembles d'études connexes

Ch. 20 Obsessive Compulsive and Related Disorders

View Set

Stats Week 2 - Data Displays, Descriptive Statistics, and Graphs

View Set

Passive Voice - English File int plus - File 8B

View Set

vulnerable pop unit 6- ptsd, dissociative disorders, sexual violence

View Set

Chapter 6 Smartbook Managerial Accounting

View Set

Fluid Machinery (Hydraulic Turbines)

View Set

Quiz: Chapter 21, The Neurologic System EAQ

View Set