TCNO Week 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which Windows tool in an Active Directory domain can apply a single AutoPlay configuration to all domain-joined computers?

Group Policy

What data privacy enhancement removes directly identifying elements in raw data and replaces it with randomly generated pseudonyms?

Tokenization

Which is most commonly used to secure a password manager vault?

PKI certificate

You are configuring MDM policies regarding failed login attempts on smartphones. Which setting value disables device wipe upon incorrect password attempts?

0

Which UDP ports are used by RADIUS?

1813 1812

Which is the default TCP port number for HTTPS?

443

Do not implement any safeguards

Acceptance

It is a basic identity layer on top of the OAuth 2.0 protocol

OIDC

Which mobile device provisioning strategy consists of devices being provided by the organization?

COPE

Which web browser provides the most privacy online?

Tor Browser

Which term describes running multiple passes of random data writing to wipe storage media?

Hard wipe

It is an open authorization framework that lets third-party applications get limited access to HTTP services

OAuth

How does disabling SSID broadcast enhance Wi-Fi security?

The WLAN name is not visible to user devices

Which TCP port is used by TACACS+?

49

What are some signs you may have a Rootkit installed on your system?

Blue screens Performance issues

What is the difference between a wireless router and a wireless access point?

Wireless routers can send WLAN traffic to other remote networks

Which of these represents an attribute of a structured attack?

Planned Organized Persistent Multi-phased

What are some of the commands you can use in the recovery console?

chkdsk fixmbr fixboot

Which Windows command line tool manages EFS?

cipher

How can you prevent boot sector viruses?

Maintain an updated operating system Maintain hardware-based updates Use an updated antivirus

What does AWS use to assign permissions to groups and/or users in IAM?

Managed policies

Which characteristics would make a building more susceptible to tailgating attacks?

Multiple entrances Busy office space Large number of active employees

What are some signs that you may be under a distributed denial of service attack?

Odd web facing network traffic patterns Sudden surge in requests Slow performance

What are some signs that you have a Cryptomining malware installed on a computer?

Overheating GPU Increased CPU usage Decreased performance

You need to ensure that data on decommissioned hard disk drives cannot be recovered before the drives are sent to a shredding facility. Which option is the best choice?

Use degaussing to eliminate magnetic fields

How can you protect yourself from a brute force attack?

Use two-factor authentication Don't reuse passwords Use long complex passwords

Which Wi-Fi standards use AES?

WPA2 WPA3

What advanced authorization method can be used to put restrictions on where a mobile device can be actively used based on GPS?

Geofencing

Which of the following activities are related to proactive hacking?

Period security control review Applying patches

How can enterprise settings and data be destroyed over a network by IT admins for a stolen smart phone?

Remote wiping

Which of these is considered a primary or secondary loss from a data breach?

Replacement Reputation Productivity Response

What are the different types of keyloggers?

Software-base keyloggers Physical keyloggers

With asymmetric encryption, which key is used to decrypt a message?

Private

What are some common types of a Trojan Horse?

Downloader Fake AV Backdoor

According to GDPR, what is a public document provided by an organization that explains how they will process personal data and how the organization applies data protection principles?

Privacy notice

How do NTFS permissions differ from share permissions?

They are enforced locally

What data designation refers to information that, though unclassified, often requires strict controls over its distribution?

Sensitive but unclassified

How might an attacker fake a secure connection?

SSL hijacking HTTPS spoofing SSL striping

What are some features of modern anti-malware software?

Web filtering Sandboxing

Which term defines sending a malicious email message to a user in an attempt to trick them into divulging sensitive information or clicking a link?

Phishing

In the IEEE 802.1X architecture, which component is the most likely to send the initial EAPOL frames?

Supplicant

Which authentication methods are considered biometric?

Fingerprint Facial recognitions

Which types of phishing attack might be undertaken by an attacker?

Spearphishing Whaling

Which type key is normally used to encrypt storage on a smartphone?

Symmetric

Which firmware component is automatically used with BitLocker for the operating system drive?

TPM

You are managing the properties of an Active Directory user account using the Active Directory Users and computers tool. You need to set login time restrictions. Which tab should you click?

Account

You have a temporary folder that periodically triggers a false positive for virus detections when you install apps. What should you do to prevent these false positives in the future?

Add an exclusion

Which of the following represents the maximum tolerable amount of system downtime?

RTO

hich cloud computing characteristic best relates to autoscaling?

Rapid provisioning

What is the first phase of ethical hacking?

Reconnaissance

Choose not to undertake actions that introduce risk

Avoidance

What should be done prior to executing a pen test?

Back up configurations and data

How can you protect your organization from insider threats?

Create a culture of security Monitor critical assets with video

Which of these has the role of the keeper of information from a technical standpoint such as maintaining confidentiality, integrity, and availability?

Custodian

Which malicious actors might undertake a zero-day attack?

Cybercriminals Nation states conducting cyber warfare Hacktivists

Which data might you find while dumpster diving?

Medical records Phone numbers Credit card statements

Implement safeguards that will reduce risk

Mitigation

Which Linux command switches to the root account?

su

What is the purpose of a web browser extension?

It provides additional functionality to a web browser

Which tool provides hundreds of pen testing tools?

Kali Linux

What is a strict non-discretionary model defining relationships between subjects and objects?

MAC

How is port triggering different from port forwarding?

Port forwarding leaves a TCP or UDP port open all the time

Which device can you install on a monitor to help protect against shoulder surfing?

Privacy Screen

What are some of the impacts that an XSS attack could have on an organization?

Hijacking accounts Spreading of malware

What entity has the responsibility to protect the federated identity's stored credentials and then provide them when requested?

Identity provider

Which port do ICMP echo requests use?

Echo requests do not use a port number

Which steps would an attacker take in an evil twin attack?

Attacker creates a fake Captive Portal Attacker lures victims into connecting to evil twin

ALE = _______ x ARO

SLE

It is popular with colleges and universities

Shibboleth

Which Wi-Fi standard uses TKIP?

WPA

Pass the risk to a third-party

Transference

What can members of the ADMINISTRATORS group do that members of the POWER USERS group cannot?

Change display settings

Which are some advantages to using a software firewall?

Configurable Affordable

What is the difference between a vulnerability and an exploit?

Exploits actively take advantage of weaknesses

What are some areas you may want end-user training to focus on?

Identifying malware Email usage Removable storage usage

Which security strategy can minimize the harm caused by a compromised IoT device?

Isolate IoT devices on their own VLAN

Which steps can be taken to help prevent whaling attacks?

Enhanced email security Data protection software Senior management training

Which aspect of computing does MFA enhance security for?

Authentication

What is a benefit of ethical hacking?

Discover weaknesses before malicious users do

What is another term for a key fob?

Hardware token

Which combinations constitute multifactor authentication?

PKI certificate, password for private key Username, PKI certificate

t is an XML-based open-source SSO standard used by many organizations

SAML

What does Kerberos authentication use to grant user access to resources?

Ticket

What is a tamper-resistant security chip installed on the device or built into PCs, tablets, and phones?

TPM

What is the amount of time available to recover a resource, service, or function?

RTO

How can you prevent a SQLi attack?

Use strict allowlists Scan regularly for vulnerabilities

Which mobile device options should administrators enable to protect sensitive data on lost or stolen smartphones?

Encryption of data-at-rest Remote wipe

Which type of hacker has malicious intent?

Black hat

Which type of pen testing is normally prohibited by public cloud service providers?

DoS

Which name is given to private browsing mode in the Google Chrome web browser?

Incognito

Which Windows feature can prevent apps from making changes without your consent?

UAC

You need to protect a web application from common web app attacks. What should you implement?

WAF

Which cryptographic solution in WPA2 replaces TKIP?

AES

Which security measure involves an inner door that opens only when outer door closes completely?

Access control vestibule

How can you protect a computer from Virus activity?

Download from trusted sites only Perform systems updates Updated anti-virus protection

Which of these disasters would be considered environmental?

Landslide

When conducting an impersonation attack, who might an attack impersonate to have the best results?

Influential persons Well-known brands Third-party vendors

It uses a Ticket Granting Server (TGS)

Kerberos

Which network authentication protocol is used by Microsoft Active Directory?

Kerberos

You manage a fleet of Android and iOS smartphones. Updates must be applied for the mobile OS and apps. Which tool allows the central management of smartphones?

MDM

Which is a legal document related to the potential of exposing sensitive data during a pen test?

NDA

Which cryptographic solution in WPA3 personal replaces a pre-shared key (PSK)?

SAE

Which types of spyware may you encounter on a system?

Trojan spyware Cookies Adware

You have configured Active Directory Group Policy password settings. Which command refreshes Group Policy immediately on a host?

gpupdate

Which type of information can be gathered by running a network scan?

Active IP addresses Open ports

What can you do to limit the impact/chances of a ransomware event?

Back and secure data regularly Maintain updated security software Educate users on safe computer usage

Which type of spoofing attack might an attacker attempt?

Email spoofing Website spoofing IP address spoofing

You are configuring a Cisco router for centralized AAA with a RADIUS server cluster. What type of account would you create to get administrative access if the RADIUS servers are temporarily unavailable due to a network issue?

Emergency account

Which are some of the typical types of social engineering attacks?

Phishing Tailgating Pretexting


संबंधित स्टडी सेट्स

Saunders Psychiatric Medications

View Set

Banner Corporate Compliance (CIA Vendor) Exam

View Set

CIS211C Intro to Programming - Final - Part 1

View Set

What is love and suffering wrkst

View Set

FINC311 CH10, Ch 11, CH12 Connect

View Set

Chapter 45: Drugs for Diabetes Mellitus

View Set

Chapter 1 Introduction to Cloud Computing and AWS

View Set