Ch. 14 - Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

B. Implement an all-in-one UTM security appliance.

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: -No one from the internet should be able to access her internal network. -Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. -Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. -A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria? A. Implement a content filter. B. Implement an all-in-one UTM security appliance. C. Implement an intrusion prevention system (IPS). D. Implement an email security appliance. E. Implement a firewall.

B. Cable locks

A public library has purchased new laptop computers to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should they use to physically secure the new laptops? A. A multi-factor password policy B. Cable locks C. Biometric authentication D. An external encryption device

B. Shutting down the system

A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence? A. Disconnecting the system from the network B. Shutting down the system C. Restricting physical access to the system D. Copying the contents of memory to removable media

C. Principle of least privilege

A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him Administrator privileges. Later, Joe discovers that he has access to the salaries in the payroll database. Which of the following security practices was violated? A. Strong password policy B. Multi-factor authentication C. Principle of least privilege D. Entry control roster

B. On an external drive

After a malware infection has been fully remediated, you should re-enable System Restore and run a full system backup. Which of the following is the BEST place to save this backup? A. In the cloud B. On an external drive C. On the main hard drive on your computer D. On the secondary drive on your computer

A. Software issues

An employee calls to complain that their browser keeps opening up to a strange search engine page, and a toolbar has been added to their browser. Which of the following malware issues are MOST likely causing the problem? A. Software issues B. Internet connectivity issues C. Internet setting issues D. Altered file issues

A. FERPA

As the principal of a private school, you have discovered that an office assistant has shared a student's home address with an unauthorized individual. Which of the following regulations is your school in violation of? A. FERPA B. SOX C. HIPAA D. CCPA

C. Privacy filter

During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display? A. Cable lock B. Mantrap C. Privacy filter D. Smart card

C. You want to restrict internet users from accessing private data on your network.

In which of the following situations should you install a firewall? A. You want to improve internet performance by saving popular websites locally. B. You want internet users to see a single IP address when accessing your company network. C. You want to restrict internet users from accessing private data on your network. D. You want to implement a password system for internet users who access your private website.

An organization looks for existing security flaws in their system.--Proactive A network intrusion detection system (IDS) detects malicious traffic.--Active A technician performing maintenance on a computer discovers prohibited content.--Passive A device or practice helps determine how and why a security incident occurred.--Passive

Match each incident detection method on the left with the appropriate description on the right. (Each method may be selected more than once.) -Passive -Active -Proactive

D. Unprotected

What do you call a system that has no anti-malware or firewall installed? A. Unpatched B. End-of-life C. Compliant D. Unprotected

A. Certificate authority

What is issued to a website in order for it to be validated as a trusted website? A. Certificate authority B. Extension C. Hash code D. DNS

D. Jailbreaking

Which mobile device vulnerability results in a user unlocking all of a mobile device's features and capabilities? A. Spoofed application B. Developer Mode C. An APK signature D. Jailbreaking

A. Increased data usage & B. Connectivity issues

Which of the following are common symptoms of a compromised mobile device? (Select two.) A. Increased data usage B. Connectivity issues C. Wi-Fi spoofing D. Screen flickering E. An increase in junk email

A. Changed file permissions. & B. Renamed system files.

Which of the following are likely symptoms of a malware infection? (Select two.) A. Changed file permissions. B. Renamed system files. C. Receipts of phishing emails in your inbox. D. Operating system updates that were installed without your knowledge. E. Cookies placed by a recently visited website.

A. Proxy settings & D. DNS settings

Which of the following are the FIRST settings you should check if you suspect that a malware attack has impacted your internet connection? (Select two.) A. Proxy settings B. Internet Connection Sharing settings C. VPN settings D. DNS settings E. BIOS settings

C. Trojan horse

Which of the following is a program that appears to be a legitimate application, utility, game, or screen saver, but performs malicious activities surreptitiously? A. Ransomware B. Scareware C. Trojan horse D. Worm

B. Signing in with the browser password gives a hacker control over all passwords stored on the browser.

Which of the following is a risk associated with using a web browser password manager? A. Passwords stored in the password manager may not work on newer web pages. B. Signing in with the browser password gives a hacker control over all passwords stored on the browser. C. You are limited to the number of passwords you can store in a web browser password manager. D. Web browser password managers cannot store complex passwords.

A. It can cause certain sites and browsers to no longer work on specific web pages.

Which of the following is an issue with using an adblocker extension on your web browser? A. It can cause certain sites and browsers to no longer work on specific web pages. B. It can be a security risk to your stored password information. C. It can prevent the web browser from retaining password information. D. It can prevent you from synchronizing bookmarks from one computer to the next.

D. Endpoint management server

Which of the following keeps track of various network devices while ensuring that the software is secure? A. Syslog server B. Firewall C. All-in-one security appliance D. Endpoint management server

D. Method of destruction

Which of the following must be included in a hard drive's Certificate of Destruction? A. Name of security administrator B. Cost of destruction C. Location of destruction D. Method of destruction

C. Hashing

Which of the following password manager features converts a password into a jumbled string of symbols and letters before storing it in the account? A. Two-factor authentication B. Cloud access C. Hashing D. Extensions

A. Authentication

Which of the following processes is used to prove a user's identity? A. Authentication B. Certificate Manager C. Logical security D. Authorization

B. ACL

Which of the following provides a set of rules that specify which types of network traffic are allowed through a firewall? A. Application-level gateway B. ACL C. Packet filtering D. Circuit-layer gateway

A. Hard tokens provide a higher level of security.

Which of the following statements is true regarding hard tokens? A. Hard tokens provide a higher level of security. B. Hard tokens are easy to replace if they are lost or stolen. C. Hard tokens provide protection even if they are lost or stolen. D. Hard tokens are inexpensive to implement.

C. Cost of special equipment

Which of the following would be a reason to outsource hard drive destruction? A. Against the law to do it internally B. Required COD C. Cost of special equipment D. Availability of low-level formatting

C. Application layer

Which type of DoS attack exhausts the target's resources by overloading a specific program or service? A. Distributed B. Protocol C. Application layer D. Amplification

A. APK file

Which type of file is commonly used by trusted websites to create installation software for mobile devices? A. APK file B. SYS file C. EXE file D. BAT file

A. Run a full system scan using the anti-malware software installed on your system. & E. Update the virus definitions for your locally installed anti-malware software.

While browsing the internet, a pop-up browser window comes up, warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the BEST next actions to take? (Select two.) A. Run a full system scan using the anti-malware software installed on your system. B. Close the pop-up window and ignore the warning. C. Use an online search engine to learn how to manually remove the virus. D. Click on the link provided to scan for and remove the virus. E. Update the virus definitions for your locally installed anti-malware software.

A. Train the receptionist to keep their iPad in a locked drawer when not in use. & D. Disable the network jacks in the reception area.

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to a locked door in the reception area. They use an iPad application to log any security events that may occur. They also use their iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area so that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations are you MOST likely to make to this organization to increase their security? (Select two.) A. Train the receptionist to keep their iPad in a locked drawer when not in use. B. Require users to use screen saver passwords. C. Move the receptionist's desk to the secured area. D. Disable the network jacks in the reception area. E. Replace the biometric locks with smart cards.

A. Disconnect Vivian's computer from the network.

You are an IT technician for your company. Vivian, an employee, has been receiving error messages, indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian called again because she is still having the same issue. You now suspect that a corruption or a renaming of the system files is being caused by malware. Which of the following is the FIRST step you should take to remove any malware on the system? A. Disconnect Vivian's computer from the network. B. Disable System Restore. C. Back up Vivian's critical files and perform a clean install of Windows. D. Perform a scan using anti-malware software.

D. WinPE

You are troubleshooting a malware infection. As part of the remediation process, you have used a USB drive to boot into a lightweight version of Windows. Which of the following did you MOST likely boot into? A. Safe Mode B. System Restore C. Sheep dip computer D. WinPE

D. Firewall

You are trying to connect from outside the company network to a server inside the company network using RDP (Remote Desktop Connection). However, the connection is failing. Which network device does your network administrator MOST likely need to configure to allow this connection? A. Access point B. Hub C. Switch D. Firewall

C. Something you are

You are working as a junior network technician at the local hospital. The security administrator has just finished rolling out a new security policy that requires users to log in to workstations using a fingerprint scanner. Which authentication category does this fall under? A. Something you have B. Soft token C. Something you are D. Something you know

C. HIPAA

You have accepted a position working in a local hospital's IT department. Which of the following government regulations would be the most important for the hospital to be in compliance with? A. FERPA B. PCI DSS C. HIPAA D. GDPR

A. Principle of least privilege

You have been hired to assess a client's security. During your testing, you discover that users have access to other departments' files. Which of the following should you recommend that the company implement? A. Principle of least privilege B. Certificate Manager C. Bring Your Own Device D. Mobile device management

A. Install bollards.

You have been hired to evaluate a client's building security. In your walkthrough, you notice the following: A high fence is installed around the property. Security cameras are installed on all buildings. The parking lot has light poles installed in all areas. Vehicles are able to drive straight to the building entrance itself. Which of the following would you MOST likely recommend that your client do to increase security based on this information? A. Install bollards. B. Install barbed wire on the fence. C. Upgrade the security cameras to a better quality option. D. Upgrade the light poles to LED lights.

D. Install the WAP on the ceiling or inside of a special locked box.

You have been hired to evaluate a client's building security. In your walkthrough, you notice the following: All pieces of equipment have cable locks installed. Server racks are locked and have alarms. The WAP for the guest Wi-Fi is located on the receptionist's desk. Biometric locks are installed on high security rooms. Which of the following would you MOST likely recommend that your client do to increase security based on this information? A. Upgrade the equipment cable locks. B. Replace the biometric locks with standard locks. C. Install biometric locks on the server racks. D. Install the WAP on the ceiling or inside of a special locked box.

C. Place a security guard at the entrance gate with an access list to control who comes on the property.

You have been hired to evaluate your client's building security. In your walkthrough, you notice the following:A high fence is installed around the property.Visitors are able to enter the building and are checked in by a receptionist.Security cameras are installed on all buildings.Server racks are locked and have alarms. Which of the following would you MOST likely recommend that your client do to increase security based on this information? A. Install barbed wire around the top of the fence. B. Upgrade the security cameras. C. Place a security guard at the entrance gate with an access list to control who comes on the property. D. Install biometric locks on all server racks.

D. Evil twin attack

You have been hired to help assess the security of your client's organization. During your assessment, you have found a rogue wireless access point that is configured to look identical to the legitimate wireless network. Which of the following attacks was MOST likely being carried out? A. DNS spoofing B. Session hijacking C. HTTPS spoofing D. Evil twin attack

C. SQL injection

You have been hired to investigate a recent cybersecurity attack. You have discovered that the attacker was able to send commands to the server using the login fields and steal user credentials from the database. Which of the following attacks was your client MOST likely the victim of? A. Cross-site scripting B. On-path C. SQL injection D. Brute force

B. Disable Windows System Restore

You have been tasked with removing malware from an infected system. You have confirmed that there is an infection, and you continue running scans and removing the malware, but every time the system is rebooted, the malware comes back. Which of the following should you do to help prevent this from happening? A. Boot into Safe Mode B. Disable Windows System Restore C. Quarantine the system D. Use a different anti-malware program

C. False security warning

You have just visited a website on your mobile device when your web browser locks up, and you receive a warning that your device has a virus. You are given a phone number to call to remove the virus. Which of the following describes the type of malware symptom that you are MOST likely experiencing? A. Connectivity issue B. Increased data usage C. False security warning D. Spoofed application

B. DNS server

You want to set up a service on your company network that can be configured with a list of valid websites. The service should give employees a certificate warning if they try to visit a version of an untrusted site. Which of the following services is designed to provide this functionality? A. Extensions B. DNS server C. DHCP server D. Hashing

D. Turn on Developer Mode.

Your company is creating a financial application that you want to first test on mobile devices. Several customers have asked to be part of the beta testing process. What do the employees need to do on their mobile devices in order to be able to participate in the beta test? A. Jailbreak their mobile devices. B. Enable authentication on their mobile devices. C. Install and use a password manager. D. Turn on Developer Mode.

B. Forward proxy server

As a network administrator for your company, you want to set up a network device that manages traffic leaving and entering your network from the outside. Which of the following would BEST meet your requirements? A. Content filter B. Forward proxy server C. VPN D. Reverse proxy server

A. Zero-day attack

Which of the following attacks exploits a vulnerability in software that has not been discovered by the developer? A. Zero-day attack B. Insider threat C. XSS attack D. Brute force attack

B. Proxy server

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service? A. DHCP server B. Proxy server C. Print server D. Web server

A. Disable the Guest account.

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are Limited users, while the third (your account) is an Administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each Limited and Administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has also been disabled on the system. Which of the following actions is MOST likely to increase this system's security? A. Disable the Guest account. B. Change the two Limited user accounts to Administrative users. C. Change your user account to a Limited user. D. Enable Autorun on the system.

A. Identify the proxy server name and port number in Internet Options.

Two employees are unable to access any websites on the internet, but they can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following actions would BEST resolve this issue? A. Identify the proxy server name and port number in Internet Options. B. Reconfigure the clients to send all traffic directly to the ISP, bypassing the proxy server. C. Identify the filter settings on the proxy server for specific internet sites. D. Use ipconfig to confirm that APIPA has not assigned an IP address.

D. Certificate of Destruction

What should be created when you destroy a hard drive? A. Chain of Custody B. Outsourcing Record C. Record of Format D. Certificate of Destruction

A. BitLocker

Which Windows feature can you use to encrypt a hard drive volume? A. BitLocker B. EFS C. NTFS D. BitLocker to Go

B. Something you know

Which authentication category does a username and password fall under? A. Soft token B. Something you know C. Something you are D. Something you have

C. It monitors the actions you take on your machine and sends the information back to the originating source.

Which of the following describes spyware? A. It monitors the actions of a user and then sends pop-up ads to the user that match their tastes. B. It is a malicious program that is disguised as legitimate software. C. It monitors the actions you take on your machine and sends the information back to the originating source. D. It is a program that attempts to damage a computer system and replicate itself to other computer systems.

D. Access control list

Which of the following does Windows use to manage and enforce what a user is authorized to access? A. Certificate Manager B. Multi-factor authentication C. Soft token D. Access control list

select Connections tab

You want to configure a Windows workstation with your network proxy server's IP address from Control Panel using the Internet Properties window. Click on the tab in the Internet Properties window that you would use to do this. (graphic of internet properties window)

B. Install a proxy server. Allow internet access only through the proxy server.

You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria? A. Configure each system's Local Security Policy to add access restrictions based on time of day and content. B. Install a proxy server. Allow internet access only through the proxy server. C. Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content. D. Enable Windows Firewall on each system. Add or remove exceptions to control access based on time of day and content. E. Configure internet zones using Internet Options.

D. Trojan

Anna, a user, downloaded a free PDF editing application from the internet. Now her laptop constantly displays desktop pop-ups, and several applications don't start. Which of the following types of malware was Anna the victim of? A. Worm B. Social engineering C. Spyware D. Trojan

A. Disable Autorun on the system. & D. Set a screen saver password.

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are Limited users, while the third (your account) is an Administrative user. Each Limited and Administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase this system's security? (Select two.) A. Disable Autorun on the system. B. Change the two Limited user accounts to Restricted users. C. Enable the Guest account. D. Set a screen saver password. E. Assign each user a simple password so that they won't be tempted to write it down.

B. Transparent data encryption

Which database encryption method can you use to encrypt data at rest? A. Column-level encryption B. Transparent data encryption C. Application-level encryption D. Trusted Platform Module

C. Low-level formatting

Which formatting method is done by the manufacturer to write new sectors and tracks to a hard drive? A. Deep format B. High-level formatting C. Low-level formatting D. Full format

C. High-level formatting

Which formatting method leaves data on a drive in a state that can be recovered using special software? A. Full format B. Low-level formatting C. High-level formatting D. Deep format

D. Degaussing

Which hard drive destruction method uses a strong magnetic pulse to destroy data? A. Disk shredder B. Drilling C. Incineration D. Degaussing

D. The resources that a user can access.

Which of the following BEST describes authorization? A. The policy of allowing employees to use their own devices for work purposes. B. The process of giving users access to only the resources they need. C. The process of verifying a user's identity. D. The resources that a user can access.

A. Email & E. Malicious websites

Which of the following are the most common means of virus distribution? (Select two.) A. Email B. Floppy disks C. Music files from the internet D. Commercial software CDs E. Malicious websites

D. Adware

While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches that you have performed. Which of the following is this an example of? A. Grayware B. Worm C. Trojan D. Adware

B. PIN and authentication app

Which of the following authentication combinations is an example of multi-factor authentication? A. Username and password B. PIN and authentication app C. Fingerprint and retinal scan D. Smart card and one-time code

A. Mobile device management

Your company has recently implemented a BYOD policy. To protect the network, users must install an app on their devices that allows the security administrator to enforce the security policies. Which of the following is this an example of? A. Mobile device management B. Soft token C. Certificate Manager D. Access control list

B. Vishing

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred? A. Tailgating B. Vishing C. Phishing D. Eavesdropping

C. Reverse proxy server

As a network administrator for your company, you want to set up a network device that manages internal traffic between servers and clients. Which of the following would BEST meet your requirements? A. VPN B. Content filter C. Reverse proxy server D. Forward proxy server

B. Authentication app

Which of the following is an example of a soft token? A. USB security device B. Authentication app C. Smart card D. Key fob

D. Private Browsing Mode

While browsing the internet, you want to make sure that the browser you are using does not store your search history, cookies, or password information. Which of the following can you enable to prevent this from happening? A. Data cache clearing B. Browser synchronization C. Pop-up blocker D. Private Browsing Mode

D. Access control vestibule

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge. Which of the following security measures would you MOST likely implement to keep this from happening in the future? A. Lo-jack recovery service B. Door locks with card readers C. Cable locks D. Access control vestibule

C. Restrict the user's login times to work hours only.

You are assisting the security administrator and discover that a user was logged in to their workstation after hours. After further investigation, you discover that the user's account was compromised, and someone used the account to steal sensitive data. Which of the following could have BEST prevented this from happening? A. Implement a password reset policy. B. Require a stronger password. C. Restrict the user's login times to work hours only. D. Implement a screen saver lock.

B. Fingerprint and one-time code text message

You are establishing a new security policy for user authentication and want to implement multi-factor authentication. Which of the following would BEST accomplish this? A. Smart card and one-time code text message B. Fingerprint and one-time code text message C. Fingerprint and iris scan D. Username and password

B. Network Configuration Operator

You are working at the local hospital in the IT department. You have just received a promotion to junior network technician. Part of your new role involves troubleshooting network communication issues. Which of the following user groups should your account be added to? A. Administrator B. Network Configuration Operator C. Cryptographic Operator D. Remote Desktop Users

B. A proxy server is filtering access to websites.

You connect your computer to a wireless network available at the local library. You find that you cannot access several websites on the internet. Which of the following is the MOST likely cause of this problem? A. Port triggering is redirecting traffic to the wrong IP address. B. A proxy server is filtering access to websites. C. The router has not been configured to perform port forwarding. D. A firewall is blocking ports 80 and 443.

D. Open the firewall port for the Remote Desktop protocol.

You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. Which of the following is the BEST solution to your problem? A. Move your home computer outside of the firewall. B. Configure a VPN connection to your computer. C. Open the Telnet and SSH ports in your firewall. D. Open the firewall port for the Remote Desktop protocol.

B. Secure the affected system.

You work for a company that offers their services through the internet. It is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next step you need to perform in response to the security incident? A. Identify the issue further. B. Secure the affected system. C. Eradicate the issue. D. Investigate how the attack occurred.

A. Stop the attack and contain the damage by disconnecting the system from the network.

A security incident is currently occurring on your company's network. You discover that the attack involves a computer system that is attached to the network. You are unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take FIRST? A. Stop the attack and contain the damage by disconnecting the system from the network. B. Determine whether you have the expertise to conduct an investigation or whether you need to call in additional help. C. Document and photograph the entire crime scene, including the current state of the attached computer system. D. Examine the active computer system to analyze the live network connection, memory contents, and running programs.

C. Document what is on the screen.

A technician was able to stop a security attack on a user's computer. Which of the following actions should be performed FIRST when conducting the subsequent forensic investigation? A. Remove the hard drive. B. Turn off the system. C. Document what is on the screen. D. Stop all running processes.

C. Chain of custody

As part of the response to a security incident on your company network, you have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up to the time of presentation in court. Which document have been asked to draft? A. Rules of evidence B. FIPS-140 C. Chain of custody D. CPS (Certificate Practice Statement)

D. Evil twin

At company headquarters, several employees are having issues with their Wi-Fi access suddenly dropping and then reconnecting to the same wireless network. You decide to investigate and determine that someone has set up a rogue access point near company headquarters and is using it to capture sensitive data from the company network. Which type of social engineering attack is being used? A. Impersonation B. Eavesdropping C. Phishing D. Evil twin

A. Firewall & security

For some time now, you have been using an application on your Windows 11 computer at home and while in the office. This application communicates with the internet. Today, your team lead decides to have a special team meeting at a local hotel. During this meeting, you obtain access to the internet using the hotel's network, but when you try to run your application, it cannot communicate with the internet. Which of the following Windows settings is MOST likely causing this behavior? A. Firewall & security B. Bluetooth & devices C. Network & internet D. Windows permissions

C. Intrusion detection

Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic? A. VPN B. Intrusion protection C. Intrusion detection D. Anti-spam

B. il0ve2EatIceCr3am! & C. I love the Linux P3ngu!n Tux

Which of the following are examples of a strong password? (Select two.) A. NewYorkCity B. il0ve2EatIceCr3am! C. I love the Linux P3ngu!n Tux D. skippy E. Morganstern

B. Improper disposal, C. Number of different devices, & E. Data leakage

Which of the following are risks of implementing a BYOD policy? (Select three.) A. Increased productivity B. Improper disposal C. Number of different devices D. Employee satisfaction E. Data leakage F. Work flexibility G. Lower costs

B. Lights

Which of the following can be paired with a motion sensor to improve security? A. Magnetometer B. Lights C. Door lock D. Cable lock

D. Key fob

Which of the following door locks provides authentication to a specific lock over a Bluetooth connection? A. Standard lock B. Biometric C. Smart card D. Key fob

D. Block employees from accessing certain websites. & E. Cache web pages.

Which of the following functions are performed by proxy servers? (Select two.) A. Filter unwanted email. B. Block unwanted packets from entering your private network. C. Store client files. D. Block employees from accessing certain websites. E. Cache web pages.

D. Drilling

Which of the following hard drive destruction methods only works with mechanical hard drives? A. Incineration B. Low-level format C. Disk shredder D. Drilling

C. Incineration

Which of the following hard drive destruction methods runs the risk of releasing toxic by-products? A. Drilling B. Shredding C. Incineration D. Degaussing

A. Chain of Custody

Which of the following identifies who had possession of a hard drive and for how long before it was actually destroyed? A. Chain of Custody B. Outsourcing Record C. Record of Format D. Certificate of Destruction

C. Circuit-layer gateway

Which of the following is a firewall type that scans network traffic based on TCP or UDP transmission? A. Packet filtering B. Application-level gateway C. Circuit-layer gateway D. Access control list

C. Phishing

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site? A. Evil twin attack B. Social engineering C. Phishing D. Impersonation

A. Packet filtering

Which of the following is a type of firewall? A. Packet filtering B. FTP hosting C. Packet rearranging D. Encrypting E. Protocol converting

A. Social security number

Which of the following is an example of personal, government-issued information? A. Social security number B. Credit score C. Healthcare records D. Student records

C. Back up all log files and audit trails.

Which of the following is an important aspect of evidence gathering in response to a security incident? A. Restore damaged data from backup media. B. Monitor user access to compromised systems. C. Back up all log files and audit trails. D. Purge transaction logs.

A. VPN

Which of the following proxy server roles allows users to connect to the internet anonymously with their data encrypted during transmission? A. VPN B. Firewall C. Sharing Internet Connections D. Caching

A. Caching

Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval? A. Caching B. VPN C. Sharing Internet Connections D. Firewall

C. Magnetometer

Which of the following should be installed inside the entrance to the building to prevent weapons or unauthorized equipment being brought into the building? A. Cable lock B. Access control vestibule C. Magnetometer D. Badge reader

D. Investigate and verify the malware symptoms.

Which of the following should you do FIRST when you suspect a malware infection? A. Quarantine the infected system. B. Disable Windows System Restore. C. Run a deep malware scan. D. Investigate and verify the malware symptoms.

C. Quarantine the infected system.

Which of the following should you do immediately after a malware infection is confirmed? A. Disable Windows System Restore. B. Run a deep malware scan. C. Quarantine the infected system. D. Boot to a Windows Pre-installation Environment (WinPE).

A. Mobile device management

Which of the following should you implement to monitor and manage the risks of a BYOD policy? A. Mobile device management B. Mobile application management C. Security management D. Bring Your Own Device

C. High-level format of the hard drive.

Which of the following should you perform when disposing of a computer? A. Run the motherboard through a shredder. B. Document the Chain of Custody. C. High-level format of the hard drive. D. Lock the hard drive in storage.

B. Pop-up blocker

While browsing the internet, you are constantly being bombarded by small advertisements with links attached to the web page. Which of the following can you use to prevent these advertisements from appearing? A. Data cache clearing B. Pop-up blocker C. Browser synchronization D. Private Browsing Mode

D. Clear the data cache.

While browsing the internet, you notice that your browser performance is continually slowing down. Which of the following would MOST likely increase the overall performance of your web browser? A. Switch to Private Browsing Mode. B. Enable a pop-up blocker. C. Synchronize your web browser data. D. Clear the data cache.

B. Use cable locks to chain the laptops to the desks.

You have five salespeople who work out of your office and who frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection method to address your concerns? A. Require strong passwords in the Local Security Policy. B. Use cable locks to chain the laptops to the desks. C. Encrypt all company data on the hard drives. D. Implement screen saver passwords.

A. Browser synchronization

You have just created an account for your web browser, and you want to be able to access the bookmarks you create on your home laptop with the same web browser on your company workstation. Which of the following can you use to make these bookmarks accessible on both computers? A. Browser synchronization B. Data cache clearing C. Pop-up blocker D. Private Browsing Mode

B. Two-factor authentication

You have logged into your banking website using a password, but now the website indicates that it sent you an email with a confirmation code that you need to retrieve and enter before you can continue to access the website. Which of the following security measures is being used? A. Hash code B. Two-factor authentication C. Certificate authority D. Extensions


संबंधित स्टडी सेट्स

Internet Technology Chapter 5 Suggested Exercises

View Set

Ch.5 Cost-Volume-Profit Relationships

View Set

Alg Cumulative Review Semester test

View Set

IL General Knowledge CDL Practice Test - 4

View Set

What Classroom Management Skills does an Effective Teacher Use?

View Set