CHAPTER 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A user is proposing the purchase of a patch management solution for a company. The user wants to give reasons why the company should spend money on a solution. What benefits does patch management provide? (Choose three.)

* Administrators can approve or deny patches. * Updates cannot be circumvented. * Updates can be forced on systems immediately.

10. After a security audit for an organization, multiple accounts were found to have privileged access to systems and devices. Which three best practices for securing privileged accounts should be included in the audit report? (Choose three.)

* Secure password storage * Enforce the principle of least privilege. * Reduce the number of privileged accounts.

6. The manager of desktop support wants to minimize downtime for workstations that crash or have other software-related issues. What are three advantages of using disk cloning? (Choose three.)

* easier to deploy new computers within the organization * can provide a full system backup * can provide a full system backup

3. A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provide justification for the request. What three reasons can the user use to justify the request? (Choose three.)

* the ability to obtain reports on systems * no opportunities for users to circumvent updates * the ability to control when updates occur

8. What is the difference between an HIDS and a firewall?

An HIDS monitors operating systems on host computers and processes file system activity. Firewalls allow or deny traffic between the computer and other systems.

Which service will resolve a specific web address into an IP address of the destination web server?

DNS

Companies may have different operation centers that handle different issues with the IT operations. If an issue is related to network infrastructure, what operation center would be responsible?

NOC

A new PC is taken out of the box, started up and connected to the Internet. Patches were downloaded and installed. Antivirus was updated. In order to further harden the operating system what can be done?

Remove unnecessary programs and services

An administrator of a small data center wants a flexible, secure method of remotely connecting to servers.Which protocol would be best to use?

Secure Shell

A company wants to implement biometric access to its data center. The company is concerned with people being able to circumvent the system by being falsely accepted as legitimate users. What type of error is false acceptance?

TypeII

The company has many users who telecommute. A solution needs to be found so a secure communication channel can be established between the remote location of users and the company. What is a good solution for this situation

VPN

9. A user is asked to analyze the current state of a computer operating system. What should the user compare the current operating system against to identify potential vulnerabilities?

a baseline

The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.)

at least two volumes TPM

5. The manager of a department suspects someone is trying to break into computers at night. You are asked to find out if this is the case. What logging would you enable?

audit

Why should WEP not be used in wireless networks today?

easily crackable

A user calls the help desk complaining that an application was installed on the computer and the application cannot connect to the Internet. There are no antivirus warnings and the user can browse the Internet. What is the most likely cause of the problem?

computer firewall

Why is WPA2 better than WPA?

mandatory use of AES algorithms

4. A user calls the help desk complaining that the password to access the wireless network has changed without warning. The user is allowed to change the password, but an hour later, the same thing occurs. What might be happening in this situation?

rogue access point

7. An intern has started working in the support group. One duty is to set local policy for passwords on the workstations. What tool would be best to use?

secpol.msc

Which three items are malware? (Choose three.)

virus keylogger Trojan horse


Ensembles d'études connexes

Principles of Accounting Final Exam

View Set

Insurance Pt. 4! Chpt 1 Exam Pt. 2

View Set

Matura rozszerzona gramatyka. 2021-2013 Grammar exercise.

View Set

Sarah Michelle Qbank- Womens & Mens health

View Set

chapter 3 test review- money management

View Set

history 121 final exam chapter 8-13

View Set

Security+ 3.0 Threats and Vulnerabilities (20%)

View Set

Chapter 4 Part I: D/A Concepts & Converters

View Set