ITE v5.0 Chapter 10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the primary goal of a DoS attack?

To prevent the target server from being able to handle additional requests.

Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?

Disconnect the host from the network.

All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to solve this issue?

Enable UAC on the computer.

Which two security precautions will help protect a workplace against social engineering? (Choose two.)

Ensuring that each use of an access card allows access to only one user at the time. Registering and escorting all visitors to the premises.

What are two typical physical security precautions that a business can take to protect its computers and systems? (Choose two.)

Implement biometric authentication. Disable the autorun feature in the operating system.

Which two characteristics describe a worm? (Choose two.)

Is self-replicating. Travels to new computers without any intervention or knowledge of the user.

What does a malware detection program look for when running a scan?

Patterns in the programming code of the software on a computer.

What is the name given to the programming-code patterns of viruses?

Signatures.

A user has reported that a computer web browser will not display the correct home page even if the default page is reset. What is the likely cause of this problem?

The computer has been infected with spyware.

What is the most effective way of securing wireless traffic?

WPA2

Which three questions should be addressed by organizations developing a security policy? (Choose three.)

What are the possible threats to the assets of the organization? What is to be done in the case of a security breach? What assets require protection?

Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?

What symptoms are you experiencing?

In which situation would a computer technician use the fixmbr command at the command prompt of a Windows XP computer to resolve a security issue?

When a virus has damaged the master boot record of the system disk.

A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?

Ensure the security policy is being enforced.

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

Phishing.

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

Protocols. Ports.

It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)

Set virus protection software to scan removable media when data is accessed. Disable the autorun feature in the operating system.

You want to dispose of a 2.5 terabyte hard drive that contains confidential financial information. What is the recommended procedure to achieve this?

Smash the platters with a hammer.

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

Social engineering.

Which two items are used in asymmetric encryption? (Choose two.)

A private key. A public key.

Which physical security technology can hold user authentication information, include software license protection, provide encryption, and provide hardware and software authentication that is specific to the host system?

Trusted Platform Module (TPM)


Ensembles d'études connexes

Mass Comm: Recording/Radio, Television, Online Media

View Set

Cloud Module 1 - Fundamental Cloud Computing

View Set

Careers in Early Childhood Education Lesson 8 Quiz

View Set

Human Development & Sustainable Development Goals

View Set

[Lección 5] Contextos 4 - Las estaciones

View Set

Psychology 1101 Exam 1 EXTREMELY GENERAL EDITION

View Set