Chapter 13

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation? (Choose two.)

1. BIOS 2. Login

A system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?​

EFS

Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)

1. MD5 2. SHA

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

Check for the latest OS patches and updates.

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

DDoS

A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)

1. Immediately remove the device from the network 2. Consult the company security policy to decide on actions to take against the employee.

A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)

1. Mantrap 2. security guard that checks IDs

Which two items are used in asymmetric encryption? (Choose two.)

1. Private Key 2. Public Key

A corporate executive has asked the IT department to provide a solution to ensure data security of removable drives that are being taken off the premises. Which security solution should be recommended?

BitLocker To Go

Which type of firewall serves as a relay between users and servers on the Internet, inspects all traffic, and allows or denies traffic based on a set of rules?

Proxy Firewall

A customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The customer asks the technician how to configure the computer to detect and filter phishing websites, to analyze websites for suspicious items, and to check downloads against a list of known malicious files and sites. Which web security feature should the technician demonstrate?

SmartScreen Filter

A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable?

TPM

A college student logs onto a college computer for the first time. Which security policy category should be presented to the student?

acceptable use policies

Which is an example of social engineering?

an unidentified person claiming to be a technician collecting user information from employees

A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?

antimalware

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

data encryption

A corporate employee has recently taken the mandated security awareness training and is wanting to use the correct security term. Which issue can occur when browsing the internet and is often initiated by the destination website?

pop-up

Which two statements characterize wireless network security? (Choose two.)

1. With SSID broadcast disabled, an attacker must know the SSID to connect. 2. Using the default IP address on an access point makes hacking easier.

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

1. ports 2. protocols

What would cause a Microsoft Windows update to fail?

A required prior update was not installed.

What are signatures as they relate to security threats?

One or more code patterns within a specific type of malware.

Which action could be used to determine if a host is compromised and flooding traffic onto the network?

Disconnect the host from the network.

A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?

incident handling policy

A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?

Limit the login times.

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

Social Engineering

Which type of hard drive format is commonly performed at the factory where the drive is assembled?

low-level

A technician is configuring rights and permissions in Windows 7. Which tool will the technician use?

Local Users and Groups

When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?

ransomware

A newly created company has fifteen Windows 10 computers that need to be installed before the company can open for business. What is a best practice that the technician should implement when configuring the Windows Firewall?

After implementing third party security software for the company, the technician should verify that the Windows Firewall is disabled.

When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

Ensure that all applications are working.

A technician in a small business is configuring the local security policy for a computer. Which configuration setting would the technician use to require the user to change the password after 90 days?

Maximum password age

A SOHO company has hired a technician to come in and configure and secure the computers. The technician has decided to configure a local security policy for the machines. Which setting would the technician use to ensure that the user did not make their password the same as their own user account name?

Meet complexity requirements

A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?

The laptop is infected by a virus.

A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible?

Trojan

When configuring Windows security, which term is used to mean a rule associated with an object such as a folder or printer?

permission

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

phishing


संबंधित स्टडी सेट्स

EMT-B Chapter 28 Abdominal and Genitourinary Injuries

View Set

A & P 1 chapter 11 ( Wiley plus )

View Set

Cell Theory, Prokaryotes, And Eukaryotes

View Set

Pairing of Shoulder Girdle and Shoulder Joint Movements

View Set

Unit Two- Career Portfolio and Resume

View Set

AWS Certified Cloud Practitioner Test

View Set

Chapter 22_Transoceanic Encounters and Global Connections

View Set