M12 COMPTIA CORE 2: (220-1102) Security PART #1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

While Advanced Encryption Standard (AES) keys can be either 128, 192, or 256 bits in length, AES encrypts everything in one-size data chunks. Which of the following is the size of those AES data chunks? Answer 128 520 256 192

128

Which of the following is true of a domain controller? Answer A domain can contain only one domain controller. A domain controller is a Windows server that holds a copy of the Active Directory database. A domain controller can be a member of multiple domains. Only certain domain controllers can make changes to the Active Directory database.

A domain controller is a Windows server that holds a copy of the Active Directory database.

hat is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information? Answer Active Desktop Active Directory Access SQL

Active Directory

Which of the following can be used to back up a company's certificate database? Answer MDM software Certificate Manager Hard token Master File Table

Certificate Manager

What does Active Directory use to locate and name network objects? Answer IPv4 Containers Domain controller DNS

DNS

Drag each Group Policy setting on the left to the appropriate description of how the setting is enforced on the right. Drag Drop Causes the policy to be enforced Enabled press delete to clear Does not change the current setting for the policy Disabled press delete to clear Prevents the policy from being enforced Not configured

Enabled Not configured Disabled

You have just implemented several lockout policies. Which of the following password attacks will these policies MOST effectively protect against? Answer Offline attack Online attack SQL injection Password spraying

Online attack

You are your company's Active Directory system administrator. The company has branch offices in several countries, including Mexico, Argentina, Canada, and the UK. The company only has a total of 250 employees organized in the same departments in each office. However, the company is projected to expand rapidly in the next two years. You want to create a tree of organizational units (OUs) that can adapt to the rapid growth without re-organizing the OU structure in the near future. You also want to be able to easily assign rights to certain network resources based on departmental organizational roles. Which of the following solutions would BEST meet your requirements? Answer Organize the OUs at the top level by office (country); then use group accounts to help control resource rights. Organize the OUs at the top level by department; then use group accounts to help control resource rights. Organize the OUs at the top level by employee and resource; then assign specific rights to each user. Organize the OUs at the top level by resource and office (country); then assign specific rights to each user.

Organize the OUs at the top level by office (country); then use group accounts to help control resource rights.

Which encryption method is used in WPA3 to generate a new key for every transmission? Answer SAE PSK WPS 802.1x

SAE

In which of the following security attacks does the hacker intercept session cookies in order to access the victim's account? Answer SQL injection Cross-site scripting Session hijacking Brute force

Session hijacking

Computer configuration policies (also called machine policies) are enforced for the entire computer and are applied when the computer boots. Which of the following are computer configuration policies? (Select two). Answer HKEY_CURRENT_USER Registry settings. Browser favorites and security settings. Network communication security settings. Software that has been installed on the local system. Software installed for specific users. Scripts that run at logon or logoff.

Software that has been installed on the local system. Network communication security settings.

Which of the following wireless security methods uses a common shared key that is configured on the wireless access point and all wireless clients? Answer WEP, WPA Personal, and WPA2 Personal WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise WPA Personal and WPA2 Personal WEP WPA Enterprise and WPA2 Enterprise

WEP, WPA Personal, and WPA2 Personal

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options provides the most secure access? Answer WPA2 and AES WPA and AES WPA and TKIP WPA2 and TKIP WEP 128

WPA2 and AES

Which of the following authentication methods allows you to securely connect a printer to the wireless network with the least amount of effort? Answer Captive Portal Open Network PSK WPS

WPS

Match each authentication protocol on the left with its unique characteristic on the right. (Each protocol may be used more than once). Drag Remote Authentication Dial-In Service (RADIUS) Terminal Access Controller Access-Control System (TACACS+) Kerberos Drop 1. Sends a user's credentials over UDP 2. Sends a user's credentials over TCP 3. Is a key component of Windows Active Directory 4. Provides a trusted Key Distribution Center (KDC) 5. Only encrypts the password

radius tacaacs+ Kerberos kerberos radius

Which of the following BYOD risks can leave old information, even financial data and credit card details, vulnerable to malicious purposes? Answer Bypassing security policies Data leakage Confidential data exposure Improper disposal

Improper disposal

You have been hired to evaluate a client's building security. In your walkthrough, you notice the following: A high fence is installed around the property. Security cameras are installed on all buildings. The parking lot has light poles installed in all areas. Vehicles are able to drive straight to the building entrance itself. Which of the following would you MOST likely recommend that your client do to increase security based on this information? Answer Upgrade the security cameras to a better quality option. Install bollards. Upgrade the light poles to LED lights. Install barbed wire on the fence.

Install bollards.

Where is the access control list stored on a Windows system? Answer Master File Table Hard token Certificate Manager Authentication app

Master File Table

Which of the following types of password cracking attacks is designed to avoid lockout policies? Answer Password spraying Dictionary attack SQL injection Online attack

Password spraying

Administrative Templates are Registry-based settings that you can configure within a GPO to control a computer system and its overall user experience. Which of the following can you do with an Administrative Template? (Select two.) Answer Identify allowed or blocked software. Determine who can add trusted publishers. Restrict access to Control Panel features. Control notifications. Allow users to run only the files you specify.

Restrict access to Control Panel features. Control notifications.

You have been hired to investigate a recent cybersecurity attack. You have discovered that the attacker was able to send commands to the server using the login fields and steal user credentials from the database. Which of the following attacks was your client MOST likely the victim of? Answer Cross-site scripting Brute force SQL injection On-path

SQL injection

A new computer has been added to the sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings must you use to make the change? Answer System Properties > Advanced System Properties > Remote System Properties > Computer Name System Properties > System Protection

System Properties > Computer Name

You want to perform a Windows update on your Windows 11 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update. Which of the following Control Panel utilities is BEST to enable and use prior to the update? Answer Performance View hidden files Program and Features System protection

System protection

Which of the following is an encryption algorithm that includes a base key, the MAC address of the wireless access point, and a unique packet serial number for each transmitted packet? Answer AES TKIP Kerberos RADIUS

TKIP

A large number of compromised computers are infected with malware that allows an attacker (herder) to control the computers to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe? Answer Phishing Spoofing On-path attack Zombie/botnet

Zombie/botnet

Match each Active Directory definition on the left with its corresponding component on the right. Drag A collection of network resources that share a common directory database. A folder-like container that organizes network resources. Default containers used to organize Active Directory objects that cannot be deleted. A resource within Active Directory. A Windows server that holds a copy of the Active Directory database. Drop Domain Organizational unit (OU) Built-in containers Object Domain controller nothing selected

collection of network resources that share a common directory database. A folder-like container that organizes network resources. Default containers used to organize Active Directory objects that cannot be deleted. A resource within Active Directory. A Windows server that holds a copy of the Active Directory database.


Ensembles d'études connexes

Chapter 21: Assessment of Cardiovascular Function

View Set

Domain 3. Security Architecture and Engineering Flash Cards

View Set

DTR Domain II (34%) - Nutrition Care for Individuals and Groups

View Set