12-.11-13
LAB You work as the IT Administrator for a small corporate network. A user accidentally installed an aware application on his laptop computer. He realized his mistake and used Programs and Features to uninstall it. However, whenever he starts internet Explorer, it still automatically goes to a shopping site that appears to be dubious in nature. Your task in this lab is to correct the system configuration parameter that was modified by the adware.
1. Click start/internet explores 2. click tools\internet options 3. under home page field, click use default 4. click ok
Which of the following describes Man-in-the-middle attack?
An attacker intercepts communications between two network hosts by impersonating each host
Which of the following functions are performed by proxy servers? (Select TWO)
Block employees from accessing certain websites Cache web pages
Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select TWO)
Changing the hosts file of a user's computer Exploiting DHCP servers to deliver the IP address of poisoned DNS servers
A salesperson in your organization spent most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organizations order database. Because she rarely... many of the things... Which key step should you take when implementing this configurations? select two
Configure the browser to send HTTPS requests through the VPN connection Configure the VPN connection to use IPsec
You need to configure a windows workstation with the IP address of the proxy server for your network. Click the tab in the internet properties window that you would use to do this
Connections
Which of the following statements about an SSL VPN are true? (select two.)
Encrypts the entire communication session uses port 443
The TCP/IP session state between two computers on a network is being manipulated by an attacker such that she is able to insert tampered packets into the communication stream. Which of the following BEST describes the type of attack which as occurred in this scenario?
Hijacking
Which of the following protocols provides authentication and encryption services for VPN traffic?
IPsec
Two employees are unable to access any websites on the Internet, but can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following actions would BEST resolver this issue?
Identify the proxy server name and port number in Internet Options
You would like to control internet access based on users, time of day, and Web sites visited. Which of the following actions would BEST meet your criteria?
Install a proxy server. Allow internet access only through the proxy server
Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the Internet? (Select two)
L2TP PPTP
Which of the following networking devices or services MOST likely is not compatible withVPN connections?
NAT
A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small Middle Eastern nation. The user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States. The user responded and was instructed to wire $5,000 to the sender to facilitate the transfer. She complied, but has not heard from the sender since. What type of attack occurred in this scenario?
Nigerian 419 scam
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
PPTP
Which of the following are likely symptoms of malware infection? (Select two.)
Renamed system files Changed file permissions
A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet. Which of the following BEST describes the type of attack which has occurred in this scenario?
Spoofing
A VPN is used primarily for what purpose?
Support secured communications over an untrusted network
While browsing the Internet, a pop-up browser window is displayed warning is displayed warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the next best actions to take? (select two)
Update the virus definitions for your locally-installed anti-malware software Run a full system scan using the anti-malware software installed on your system
Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement?
VPN concentrator
You connect your computer to a wireless network available at the local library. You find that you can access all Web sites you want on the Internet except for two. What might be causing the problem?
a proxy server is filtering access to websites
LAB You work as the IT administrator fo a small corporate network. a user has inadvertently allowed his local area network setting to be changed during the installation of a free software package. He reports that his browser no longer goes to his usual home page when he opens it and an error sometimes appears in his browser window saying that the proxy server isn't responding. Your company network does not use a proxy server, so the free software installation might have configures his internet options to use malicious proxy server. Your task in this lab are to do the following: deselect the option to use proxy server for your LAN configure www.testout.com as the home page for internet explorer
click start\internet explorer click tools\internet options click the connections tab click lan settings deselect the options to use a proxy server for your lan, then click ok click the general tab within the home page field , type www. testout.com; then click apply click ok
LAB Your task in this lab is to correct the system configuration parameters that were modified by the malware
open the control panel and select network and internet select internet options under the home page field, click use default select the connections tab then select lan settings select automatically detect settings deselect or uncheck the use a proxy server for your lan option click ok to close the lan settings window click ok to close the internet properties window