Chapter 12 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)

-Immediately remove the device from the network. -Consult the company security policy to decide on actions to take against the employee.

Which three rules increase the level of password strength? (Choose three.)

-Passwords should be a combination of upper and lower case letters, numbers, and special characters -Passwords should be changed by the user after specific periods of time. -Password reuse and lockout policies should be implemented.

Which action could be used to determine if a host is compromised and flooding traffic onto the network?

Disconnect the host from the network.

What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses?

Download the latest signature files on a regular basis.

When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

Ensure that all applications are working.

What is the best description of Trojan horse malware?

It appears as useful software but hides malicious code

Where in Windows would a technician configure a guest account for a temporary employee?

Local Users and Groups

Which level of Windows security permission is required for a local user to backup files from another user?

Read

A computer can successfully ping outside the local network, but cannot access any World Wide Web services. What is the most probable cause of this problem?

Windows Firewall is blocking port 80.

Which is an example of social engineering?

an unidentified person claiming to be a technician collecting user information from employees

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

firewall settings

What security technique could provide secure access to a server located in a small office without the expense of implementing a DMZ or purchasing a hardware firewall?

implement port forwarding

What is an example of the implementation of physical security?

requiring employees to use a card key when entering a secure area

Which security threat installs on a computer without the knowledge of the user and then monitors computer activity?

spyware

When would a PC repair person want to deploy the idle timeout feature?

when users are leaving their desk but remaining logged on


Ensembles d'études connexes

Module 8: Early Adulthood (Part 1)

View Set

Biology 112 - CHapter 38 Nutrition

View Set

NU 258 ch 63 Management of Patients with Neurologic Trauma

View Set

Chapter 2 Animals & Their People

View Set

intermediate accounting 2 exam 1 review

View Set

******CA Life & Health Chapter 7 Annuities Multiple Choice

View Set

All in ("ACCT 3326 Exam 3 (FINAL) CH 9 quiz Qs") folder combined PLUS All in ("ACCT 3326 ("AIS CH 8,9&12") EXTRAS but should use") folder combined

View Set