Chapter 13 Netacad Study Guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?​

EFS

When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

Ensure that all applications are working

Which is an example of social engineering?

An unidentified person claiming to be a technician collecting user information from employees

A technician has been asked by a manager to recommend a security solution for protecting a computer against ransomware. Which security technique should the technician recommend?

Antimalware

Refer to the exhibit. Which type of workstation password is being used?

BIOS

A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?

Botnet

A PC technician has been asked by a supervisor to recommend a security solution for a company that wants a device to monitor incoming and outgoing traffic and stop any malicious activity. Which security technique should the technician recommend?

Buy an IPS

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

DDoS

Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker injected false records on the server that translates IP addresses to domain names. What is the type of network attack?

DNS poisoning

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

Data encryption

Which security technique or device wipes the data from a hard drive by being placed near the drive platter for at least 2 minutes?

Degaussing wand

A PC technician has been asked by a supervisor to recommend a security solution for protecting a computer used to log in at a dental clinic from someone using a bootable disk containing hacking tools. Which security technique should the technician recommend?

Disable ports

Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?

Disconnect the host from the network

A user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first?

Hard drive

A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?

Incident handling policy

A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?

Limit the login times.

A technician is configuring rights and permissions in Windows 7. Which tool will the technician use?

Local Users and Groups

A technician in a small business is configuring the local security policy for a computer. Which configuration setting would the technician use to require the user to change the password after 90 days?

Maximum password age

A SOHO company has hired a technician to come in and configure and secure the computers. The technician has decided to configure a local security policy for the machines. Which setting would the technician use to ensure that the user did not make their password the same as their own user account name?

Meet complexity requirements

What are signatures as they relate to security threats?

One or more code patterns within a specific type of malware

When configuring Windows security, which term is used to mean a rule associated with an object such as a folder or printer?

Permission

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

Phishing

A PC technician has been asked by a supervisor to recommend a security solution for phishing. Which security technique should the technician recommend?

Provide security awareness training

Which type of firewall serves as a relay between users and servers on the Internet, inspects all traffic, and allows or denies traffic based on a set of rules?

Proxy firewall

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

Remote access

Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker was using a specific technique that affected the TCP three-way handshake. What is the type of network attack?

SYN flood

A customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The customer asks the technician how to configure the computer to detect and filter phishing websites, to analyze websites for suspicious items, and to check downloads against a list of known malicious files and sites. Which web security feature should the technician demonstrate?

SmartScreen Filter

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

Social engineering

A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable?

TPM

A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible?

Trojan

A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?

Use a mantrap

An IT technician wants to create a rule on two Windows 10 computers to prevent an installed application from accessing the public Internet. Which tool would the technician use to accomplish this task?

Windows Defender Firewall with Advanced Security

Which type of hard drive format is commonly performed at the factory where the drive is assembled?

low-level

A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend?

Antimalware

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

Check for the latest OS patches and updates.

Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a vulnerability that is known to the software vendor, but not patched yet. What is the type of network attack?

zero-day


संबंधित स्टडी सेट्स

Articles of Confederation: True or False

View Set

5a. Resective Osseous Surgery Crown Lengthening

View Set

Chapter 10 (Torts and Product Liability)

View Set