Chapter 12 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which action could be used to determine if a host is compromised and flooding traffic onto the network?

Disconnect the host from the network.

What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses?

Download the latest signature files on a regular basis.

When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

Ensure that all applications are working.

A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)

Immediately remove the device from the network. & Consult the company security policy to decide on actions to take against the employee.

What is the best description of Trojan horse malware?

It appears as useful software but hides malicious code.

Where in Windows would a technician configure a guest account for a temporary employee?

Local Users and Groups

Which three rules increase the level of password strength? (Choose three.)

Passwords should be a combination of upper and lower case letters, numbers, and special characters, Passwords should be changed by the user after specific periods of time., and Password reuse and lockout policies should be implemented.

Which level of Windows security permission is required for a local user to backup files from another user?

Read

Which security threat installs on a computer without the knowledge of the user and then monitors computer activity?

Spyware

A computer can successfully ping outside the local network, but cannot access any World Wide Web services. What is the most probable cause of this problem?

Windows Firewall is blocking port 80.

Which is an example of social engineering?

an unidentified person claiming to be a technician collecting user information from employees

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

firewall settings

What security technique could provide secure access to a server located in a small office without the expense of implementing a DMZ or purchasing a hardware firewall?

implement port forwarding

What is an example of the implementation of physical security?

requiring employees to use a card key when entering a secure area

When would a PC repair person want to deploy the idle timeout feature?

when users are leaving their desk but remaining logged on


संबंधित स्टडी सेट्स

Chapter 2 International Business Quiz

View Set

culture 3.1 (dia de los muertos)

View Set

Classification and Three Domains of Life

View Set

Chapter 20: The Spanish-American War

View Set

Macroeconomics- Chapter 7 (Glupker)

View Set