802 (part 2)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A user installed a new SOHO router and new wireless NICs to increase their transmission speed from 802.11b to 802.11g with the manufacturer's default settings. The user lives in an apartment building and is still experiencing slowness to the Internet after the installations. Which of the following is the MOST secure option that a technician could implement to resolve this issue? A. Hide the SSID B. Assign static IP addresses C. Enable MAC filtering D. Disable the WAN port

Enable MAC filtering

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do? A. Enable Windows automatic updates B. Enable screensaver required passwords C. Enable MAC filtering D. Enable wireless encryption

Enable screensaver required passwords

A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access? A. Turning down the radio power level B. Enabling MAC filtering C. Setting a high encryption level D. Disabling the SSID broadcast

Enabling MAC filtering

A user wants to quickly install the most recent security patch released. Which of the following options can be selected from the Windows Update website? A. Custom settings B. Advanced settings C. Automatic settings D. Express settings

Express settings

After being infected with a virus, a user's computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user's backup. Which of the following tools would BEST reset the computer to how it worked when first purchased? A. Recovery Console B. Factory restore CD C. Anti-malware software D. System Restore

Factory restore CD

Browser redirection is caused by which of the following types of viruses? A. Hijack B. Trojan C. Worm D. Keylogger

Hijack

A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity? A. Train users on tailgating B. Implement an escort policy C. Install mantraps D. Require all users to have badges

Install mantraps

A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system? A. System Protection B. Security Center C. Windows Firewall D. Internet Options

Internet Options

Which of the following is BEST used to prevent other people from viewing a user's computer screen? A. Anti-virus software B. Key fob C. Biometric device D. Privacy filter

Key fob

Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function? A. Deny all B. Allow all C. Most privilege D. Least privilege

Least privilege

A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem? A. Retinal scanners B. Mantraps C. Door locks D. Smart card badges

Mantraps

A technician wants to ensure that only authorized administrators can make configuration changes to the company's wireless router. Which of the following MUST the technician change to prevent unauthorized users from modifying the access point configuration? A. MAC address filters B. Manufacturer password C. Default SSID D. Configure encryption

Manufacturer password

An attack that creates a website that looks like another website, with the purpose of learning someone's account information is called which of the following? A. Virus B. Shoulder surfing C. Trojan D. Phishing

Phishing

A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network? A. Disable the router's remote management feature. B. Enable WPA2 wireless encryption. C. Change the router's default admin name and password. D. Place the router in a locked room.

Place the router in a locked room.

A user is reporting that they are clicking on search results and being redirected to the wrong sites. Which of the following should a technician check FIRST? A. Temporary Internet Files B. Proxy Settings C. Cookies D. Windows Firewall

Proxy Settings

After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware? A. Run the malware removal program while disconnected from the Internet B. Run the malware removal program in Windows Safe Mode C. Reinstall the malware removal program from a trusted source D. Set the malware removal program to run each time the computer is rebooted

Run the malware removal program in Windows Safe Mode

Which of the following can enable a technician to remove a virus that prevents users from updating their antivirus software? A. Recovery console B. REGEDIT C. Safe mode D. MSCONFIG

Safe mode

In order to prevent other users from editing files in 'C:\ Files', which of the following steps should be taken? A. Set NTFS permissions to read only B. Set the folder to index files for search C. Set the local administrator as the owner of the folder D. Set network share permissions to read only

Set NTFS permissions to read only

An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this? A. Set up shares with permissions based upon group membership. B. Implement a written policy addressing the issue for all users. C. Monitor access to the network shares using SNMP. D. Prevent remote logins to all network shares and drives

Set up shares with permissions based upon group membership.

Which of the following security threats does NOT use software to extract sensitive information or credentials? A. Grayware B. Shoulder surfing C. Malware D. Man-in-the-Middle exploits

Shoulder surfing

Which of the following security threats requires the attacker to be physically located near the target machine? A. Shoulder surfing B. Social engineering C. Phishing D. Rootkit

Shoulder surfing

An unauthorized user observing system security procedures is known as: A. A worm. B. Shoulder surfing. C. Phishing. D. Spyware.

Shoulder surfing.

Which of the following security threats is BEST mitigated through proper user training? A. A Worm B. Rootkits C. Social Engineering D. Browser Adware

Social Engineering

A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred? A. War driving B. Social engineering C. Shoulder surfing D. Phishing

Social engineering

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of? A. Shoulder surfing B. Phishing attack C. Social engineering D. Malware infection

Social engineering

Which of the following common security threats could be occurring when a user calls and requests his co-worker's password? A. Shoulder surfing B. Spyware C. Phishing D. Social engineering

Social engineering

Which of the following security threats involve shoulder surfing and phone phishing? A. Man-in-the-Middle B. Social engineering C. Trojan virus D. Spyware

Social engineering

An Internet browser's cookie could be classified as which of the following? A. Rootkit B. Phishing C. Malware D. Spyware

Spyware

A user does not want their kids to be able to install software on their home desktop. Which of the following types of accounts should the user set up in Windows 7? A. Standard B. Remote Desktop Users C. Administrator D. Power User

Standard

Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data? A. Standard format B. Low level format C. Overwrite program D. Drive wipe

Standard format

Turnstiles and other mantraps will prevent which of the following security threats? A. Shoulder surfing B. Tailgating C. Rootkits D. Viruses

Tailgating

Which of the following utilities would a technician use on a Windows Vista or Windows 7 machine to configure what applications are allowed to send/receive data over the LAN connection? A. Users and Groups B. Windows Firewall C. Registry Editor D. Task Scheduler

Windows Firewall

Which of the following areas of a file system should a standard user have restricted permissions to in order to promote a security best practice? (Select TWO). A. Temporary Internet Files B. My Document Files C. Windows System Files D. Network Files E. Program Files

Windows System Files Program Files

A user has setup a SOHO and needs to implement a network configuration that allows for sharing of devices and files across the network without the complexity of a centralized server. Which of the following would be MOST appropriate? A. PAN B. WorkGroup C. Domain D. WAN

WorkGroup

Which of the following is TRUE about the difference between a worm and a virus? A. Worms are written in assembly while viruses are written with scripting languages. B. Viruses hide in the boot record while worms hide within the file system. C. Worms self propagate while viruses need human intervention to replicate. D. Viruses disable the antivirus update service while worms kill the antivirus process.

Worms self propagate while viruses need human intervention to replicate.

Which of the following user accounts should be renamed to adhere to security best practices? A. Power user B. Guest C. Standard user D. Administrator

Administrator

Which of the following security controls would be an example of the least privilege principle on a home PC? A. Install antispyware on the PC. B. Create a standard user account for kids. C. Store all financial data in a separate folder. D. Disable the firewall for online gaming.

Create a standard user account for kids.

A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information? A. Simple 1-pass zero overwrite B. Low level 3-pass random wipe C. Low level 7-pass random wipe D. High level format 10 times

Low level 7-pass random wipe

Which of the following identifies traffic based upon its physical network address? A. Phishing B. Hashing C. MAC filtering D. Geotracking

MAC filtering

Which of the following features helps to prevent shoulder surfing? A. Native resolution B. Auto adjust C. Degaussing D. Privacy screen

Privacy screen

A computer program that functions normally while quietly installing malicious software on a machine is known as a: A. DDoS attack. B. Worm. C. Phishing attack. D. Trojan.

Trojan.

The benefit of MAC filtering in wireless networking is that the network: A. is encrypted. B. is not visible. C. uses static IP addresses. D. is more secure.

is more secure

Which of the following scenarios BEST defines phishing? A. A user receives an email from a friend to download a picture but the file format ends in .exe. B. A user receives a pop-up message about a virus from a company that states that if they buy this product it will remove the virus. C. A user receives a message about unwanted activity from their antivirus asking to remove the suspect file. D. A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.

A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity? A. Annual cyber security education B. Update antivirus signatures more often C. Block all email attachments D. Install an IPS on each workstation

Annual cyber security education

A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company's content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue? A. Anti-malware software B. Factory pre-installation C. System restore D. Recovery console

Anti-malware software

Which of the following is MOST effective in preventing security breaches on a network? (Select THREE). A. Bandwidth throttling B. Eliminate password history C. Enable QoS D. Antivirus software E. User education F. Enforced login/logoff hours

Antivirus software User education Enforced login/logoff hours

A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO). A. Install additional antivirus software B. Disable screen savers C. Conduct a daily security audit D. Assign security rights based on job roles E. Use strong passwords

Assign security rights based on job roles Use strong passwords

IT suspects that other people are frequently making changes to a computer when a user leaves their desk. Which of the following security policies can be implemented in order to prevent this situation? A. Auto-lock B. Password complexity C. Change the default username D. Disable the guest account

Auto-lock

Which of the following security measures is usually found in a laptop? A. Biometrics B. Bollard C. Hypervisor D. Key fobs

Biometrics

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO). A. Configure the workstation for a static IP B. Disable all wireless network connections C. Remove shortcuts to the application D. Block the application in Windows Firewall E. Change network location to Work F. Reroute the web address in HOSTS file

Block the application in Windows Firewall Reroute the web address in HOSTS file

A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring? A. Change to user MAC filtering B. Change default usernames and passwords C. Disable the SSID from broadcasting D. Enable static IP addresses

Change default usernames and passwords

A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST step to securing the network? A. Enable MAC filtering B. Change default usernames and passwords C. Disable unused ports D. Assign static IP addresses

Change default usernames and passwords

A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO). A. Change router default logins B. Change the security settings on their computer C. Set encryption on the router D. Update router firmware E. Change the encryption on the computer's wireless adapter

Change router default logins Set encryption on the router

When setting up a new wireless router, which of the following actions should the technician take FIRST in order to secure the network? (Select TWO). A. Disable unused ports B. Change the SSID C. Position the antennas to prevent outside access D. Enable MAC filtering E. Change the default user name

Change the SSID Change the default user name

Which of the following can be achieved with Group Policy to help with workstation security measures? A. BitLocker password B. Complexity requirements C. BIOS password D. Wake on LAN

Complexity requirements

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless such jacks are designated for guest use? A. Disable DHCP and assign a static IP address to each network device physically connected to the network. B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices. C. Disable all switch ports when they are not utilized and enable them on an as needed basis. D. Place guest network jacks in public areas and all other jacks in secure areas as needed.

Disable all switch ports when they are not utilized and enable them on an as needed basis.

Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer? A. MSCONFIG >Startup Tab B. Disable the Guest account C. Rename the Administrator account D. Disable autorun E. Restrict user permissions

Disable autorun

A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal? A. Run Windows Update B. Disable system restore C. Run the chkdsk /r command D. Disable network cards

Disable system restore

A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this? A. Make sure the computers are using strong passwords. B. Enable an intrusion detection system. C. Assign the computers static IP addresses. D. Disable the extra ports on the router.

Disable the extra ports on the router

A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO). A. Disable the guest account B. Install antivirus applications C. Disable DHCP D. Change the SSID E. Change the default username

Disable the guest account Change the default username

A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring? A. Configure the server to use a static IP B. Logically move the server to the DMZ C. Reallocate the server to a different networking closet D. Disable the remote desktop port

Disable the remote desktop port

Which of the following helps to prevent virus infections from USB flash drives? A. Strong passwords B. Password protected screen savers C. Disabling the guest account D. Disabling the autorun feature

Disabling the autorun feature

Which of the following security threats do shredders help prevent? A. Dumpster diving B. Malware C. Phishing D. Worms

Dumpster diving

Which of the following should a technician do LAST after cleaning up a virus infection? A. Enable system restore and create restore point B. Update antivirus software C. Schedule scans and updates D. Educate the end user

Educate the end user

In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data? A. Reduce broadcast power B. Change SSID name C. Set encryption D. Enable MAC filtering

Enable MAC filtering

A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure? A. Windows Firewall B. Windows Security Center C. Local Security Policy D. System Configuration

Local Security Policy

A technician would like to limit computer access to certain users. Which of the following should be configured? A. Advanced security B. Boot.ini file C. System configuration D. Local security policy

Local security policy

A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this? A. Lock the workstation B. Shutdown the computer C. Logon using the unprivileged guest account D. Set the screensaver password

Lock the workstation

A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use? A. Quick format B. FDISK C. Low level format D. Standard format

Low level format

Which of the following security threats are MOST often delivered via email? (Select TWO). A. Rootkits B. Phishing C. Shoulder surfing D. Social engineering E. Spam

Phishing Spam

For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection? A. MAC address filtering B. Windows password C. Proper SSID D. SSL certificate

Proper SSID

A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented? A. Message of the Day B. Email lists C. Company forums D. Regular user education

Regular user education

An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information? A. Lock screen pattern B. Cancel mobile service C. Remote wipe D. Six character password

Remote wipe

A user is advised by the software vendor that the user must have elevated privileges in order to run a program. The user should do which of the following to BEST accomplish this? A. Run in Windows XP compatibility mode B. Run the program in a virtual PC environment C. Log out of the system and login under another user's name D. Right click select "run as" and select administrator

Right click select "run as" and select administrator

Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage? A. Rootkit B. Virus C. Trojan D. Worm

Rootkit

Which of the following allows a hidden backdoor to be used for access to workstations on the Internet? A. Firmware B. Rootkits C. SQL injection D. Cross-side scripting

Rootkits

Privacy filters applied to users computer screens are used to combat which of the following security risks? A. Rootkits B. Spear phishing C. Shoulder surfing D. Social Engineering

Shoulder surfing

Which of the following is the MOST secure method, short of physical destruction, that would be used to ensure that data on a hard drive cannot be recovered? A. Use a degaussing tool B. Format the drive C. Use an overwrite program D. Repartition the drive

Use an overwrite program

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO). A. User training B. Anti-malware C. Paper shredding D. Time of day restrictions E. Employee badges F. Mantraps

User training Paper shredding

Which of the following security threats is defined by its self propagating characteristic? A. Virus B. Rootlet C. Trojan D. Worm

Worm

A client has asked a technician about drive sanitation and wants to know what the difference is between overwriting a drive and formatting a drive. Which of the following would be the BEST response from the technician? A. "Overwriting writes 1s and 0s to a hard drive replacing the data, while formatting only clears the reference to the data and only overwrites as space is used." B. "Nothing is different. They both destroy the data so no one can recover it." C. "Overwriting writes 1s and 0s to the drive replacing only the user's data but not the OS data, while formatting destroys the hard drive." D. "Overwriting replaces all the data with a single file that fills the hard drive destroying the data, while formatting erases all the data."

"Overwriting writes 1s and 0s to a hard drive replacing the data, while formatting only clears the reference to the data and only overwrites as space is used."

A user wants to prevent access to specific websites to prevent their children from accidently accessing them. Which of the following can be implemented? A. A switch B. Antivirus software C. Antispyware software D. A firewall

A firewall

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this? A. Configure the access point encryption from unsecured access to WEP. B. Adjust the radio power so that coverage is restricted to the business. C. Change the SSID to reflect the business name instead of a public access point. D. Enable MAC filtering and restrict access to other company's devices.

Adjust the radio power so that coverage is restricted to the business.


संबंधित स्टडी सेट्स

OB ch. 12, Chapter 25: Pregnant Woman, Ricci, Kyle & Carman: Maternity and Pediatric Nursing, Second Edition: Chapter 12: Nursing Management During Pregnancy; PrepU, Fetal Assessment for Risk Factors (Exam 3), RICCI Chapter 12, Chapter 12 OB, Chapter…

View Set

Biology: Human Anatomy and Physiology

View Set

Fundamentals of Financial Planning Questions

View Set

Microbiology Chapter 6 LearnSmart

View Set

Equations with variables on both sides (including special solutions), Literal Equations

View Set

Patient Protection and Affordable Care Act (PPACA) - Section 14

View Set

EQE Unit: 1, 16, 4, 2 [Ch 1, 2, 10, 3, 4]

View Set