1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following files extension types can be run from the command prompt?

.com .bat .exe

Which of the following file extensions indicated a Windows system file?

.dll .vxd

Which option used with the copy command makes sure that all copied files are written correctly after they have been copied?

/v

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

/y

What is a cookie?

A file saved on your hard drive that tracks Web site preferences and use.

Which of the following is an example of a strong password?

A8bT11$yi.

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which policies should you configure?

Account lockout threshold. Minimum password length.

What does the following command do? attrib +s +r -a myfile.dll

Adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute to the file myfile.dll

While browsing the Internet, You notice that your browser displays pop-ups containing advertisements that are related to recent keywords searches you have performed. What is this an example of?

Adware.

Which security practice is an example of the Principle of Least Privilege?

All users on a Windows workstation are limited users except for one user who is responsible for maintaining the system.

You computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential -C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: -Move Reports.doc from C:\Confidential to C:\PublicReports -Copy Costs.doc from C:\Confidential to C:\PublicReports What permissions do members of the Users group have to these two files in the C:\PublicReports folder?

Allow Full Control to both

You manage two folders in your computer as follows: -C:\Confidential -C:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permissions to the User groups: -Reports.doc -Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: -Move Reports.doc from C:\Confidential to D:\PublicReports. -Copy Costs.doc from C:\Confidential to D:\PublicReports. What permissions do members of the Users group have to these two files in the D:\PublicReports foler?

Allow Full Control to both

Which of the following is an important aspect of evidence gathering?

Backing up all log files and audit trails.

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is attempting to access the report through a share with the Fill Control permission assigned to the Everyone group. Which of the following statements correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

Which of the following statements are true regarding administrative shares?

By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path.

You have been asked to draft a document related to evidence gathering that contains details about personnel in court. What type of document is this?

Chain of custody.

Which of the following would indicate when a system case cover is removed?

Chassis intrusion detection.

Following Windows installation, you enabled the built-in Administrator account. You remove the password for this account. You enable Remote Desktop on your computer using the default settings. From home, you try to access your computer using Remote Desktop using the Administrator account, but you are unable to log on. What should you do?

Configure a password for the Administrator account.

You want to configure your computer so that a password is required before the operating system will load. What should you do?

Configure a user password in the BIOS/UEFI.

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would best prevent this scenario from occurring again?

Configure the software to automatically download the definition files updates as soon as they become available.

Which of the following functions are performed by the TPM?

Create a hash based on installed system components.

The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions: -Allow Full Control to the D:\Reports folder -Deny Full Control to the D:\Sales folder -Deny Full Control to the D:\Reports\2010reports.doc file -Allow Full Control to the D:\Sales\2010sales.doc file What effective permissions does Mary have to both files?

Deny Full Control to both

Your computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential -C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: -Move Reports.doc from C:\Confidential to C:\Public Reports. -Copy Costs.doc from C:\Confidential to C:\PublicReports. What permissions doe members of the Users group have to these two files in the C:\PublicReports folder?

Deny Read to the Reports.doc file; moving the file to the new folder on the same drive preserves the NTFS permissions assigned to the file.

You just bought a new notebook. This system uses UEFI firmware and comes with Windows 10 preinstalled. However, you want to use Linux on this system. You download your favorite distribution and install it on the system, removing all Windows partitions no the hard disk in the process. When the installation is complete, you find that the operating system won't load when the system is rebooted. What should you do?

Disable SecureBoot in the UEFI configuration.

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allows management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been disabled on the system. What should you do to increase the security of this system?

Disable the Guest account.

Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following: -Server systems are kept in a locked server room. -User accounts on desktop systems have strong passwords assigned. -A locked door is used to control access to the work area. Users must use ID badges to enter the area. -Users connect their personal mobile devices to their computers using USB cables. -Users work in three 8-hour shifts per day. Each computer is shared by three users. Each has a limited account on the computer they use. Based on this information, what should you recommend your client do to increase security?

Disable the USB ports on user's workstations.

When conducting a forensic investigation, and assuming that the attack has been stopped, which of the following actions should you perform first?

Document what's on the screen.

The D:\ drive in your computer has been formatted with NTFS. The Sales group on you computer has been given Allow Full Control to the D:\Sales folder. The Mary user account is a member of the Sales group. How can you prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?

Edit the properties for the file; assign Mary the Deny Full Control permission.

You want to set the encryption attribute for the C:\payroll.xls file. What should you do?

Edit the properties of the file in Windows Explorer

Which of the following actions directly improves system security on Windows systems?

Enable the Windows firewall. Install anti-malware software.

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again. Which policies should you configure?

Enforce password history. Minimum password age.

Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access?

File Explorer Computer Network

Which of the following security measures is a form of biometrics?

Fingerprint scanner.

Which type of biometric authentication uses the ridges of your skin?

Fingerprint.

If a folder exists on an NTFS partition, what is the minimum permission needed by a user to set any security permissions on the folder?

Full Control

After installing new software a few days ago, your DVD drive tray randomly began to open and close. Today, you were called into your boss's office to discuss why you are calling 900 numbers while at work. Which type of malware would create these symptoms?

Grayware.

Which of the following are common forms of social engineering attack?

Hoax virus information e-mails.

What do biometrics use to perform authentication of identity?

Human characteristics.

You're using the vi editor to manage a text file on a Linux system. You want to type new text into the file; when you type you want the existing text that comes after the cursor to be pushed down? What mode do you need to be in to do this?

Insert Mode

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. What else could you do to increase the security of this system?

Install a privacy filter on the monitor. Secure the system to the desk with a cable lock.

Which of the following best describes spyware?

It monitors the actions you take on your machine and sends the information back to its originating source.

Susan in accounting has left the company and been replaced my Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will most likely correct the problem?

Make Manuel the owner of the file.

What are the most common means of virus distribution?

Malicious web sites. E-mail.

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy-backing to gain access to your building. The individual in questions did not have a security badge. Which security measure could you implement to keep this from happening in the future?

Mantraps.

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the Accounting department in the employee's company. She relates that she has forgotten her password demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. What kind of attack has occurred in this scenario?

Masquerading.

You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do?

Modify the NTFS permissions on the folder.

Mary and Pablo share a workstation doing customer support. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. What should you do?

Modify the permissions on the document.

You have purchased a used computer form a computer liquidator. When you booth the computer, you find that there has been a password set on the BIOS. You need to clear the password so that you can edit the CMOS settings. What should you do?

Move the motherboard jumper.

You are responsible for disposing of several old workstations formerly used by accountants in your organization's Finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. To do this, you use the Windows XP Installation CDs that came with these systems to delete all partitions from the hard drives. Have you properly prepared theses systems for disposal?

No, you should use disk wiping software to fully erase the drives.

You manage two folders in your computer as follows: -C:\Confidential -C:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc You then take the following actions: -Move Reports.doc from C:\Confidential to D:\PublicReports. -Copy Costs.doc from C:\Confidential to D:\PublicReports. What permissions do members of the Users group have to these two files in the D:\PublicReports foler?

Permissions are removed from both files

You need to enable a screen saver password on the Windows workstation in you organization. Which Control Panel option should you use to do this?

Personalization.

A use within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small African nation. The user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States. The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used the information to drain her bank account. What type of attack occurred?

Phishing.

Several users have forwarded you an e-mail stating that your company's health insurance provider has just launched a new web site for all employees. To access the site they are told in the e-mail to click a link and provide their personal information. Upon investigation, you discover that your company's health insurance provider did not send this e-mail. What kind of attack just occurred?

Phishing.

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, though emails or Websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

Phishing.

You have purchased new computers and will be disposing of your old computers. These computers were previously used for stroring highly-sensitive customer order information, including credit card numbers. What should you do prior to getting rid of the computers?

Physically destroy the hard drives with a hammer.

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. What should you do?

Place the files on an NTFS partition. Configure both share and NTFS permissions.

You've just opened a text file in the vi editor and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following key-press sequences will get you into Replace Mode?

Press Insert, then press Insert again. Press the 'i' key, then press Insert. Press the 's' key, then press Insert.

Match each security policy on the left with the appropriate description on the right. Each security policy may be used once, more than once, or not at all.

Provides a high-level overview of the organization's security program. -- Organizational Security Policy Defines an employee's rights to use company property. -- Acceptable Use Policy Identifies the requirements for credentials used to authenticate to company-owned systems. -- Password Policy Identifies a set of rules or standards that define personal behaviors. -- Code of Ethics Sets expectations for user privacy when using company resources. -- Acceptable Use Policy Specifies that user accounts should be locked after certain number of failed logins attempts. -- Password Policy

While running a full system scan using your anti-malware software, three files have been identified as possible problems. You want to keep the files intact so you can review them later, but you also need to ensure they can't harm anything else on your computer. What action should you take?

Quarantine the files.

You have a file which you would like other users to see, but not modify. Which file attribute should you use?

R

The immediate preservation of evidence is paramount when conducting a forensic analysis. Which of the following actions is most likely to destroy critical evidence?

Rebooting the system.

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. A cable lock has been installed to prevent it from being stolen. What else could you do to increase the security of this system?

Remove the optical drive. Disable all USB ports in the BIOS/UEFI firmware configuration.

The chain of custody is used for what purposes?

Retaining evidence integrity by identifying people coming into contact with evidence.

How do you set file attributes?

Right-click the file, then select Properties. Use the attrib command

You have installed anti-malware software on a computer that only you use. You want to protect the computer from files that you download from the Internet. What should you do next to make sure that there aren't any existing files on your system that are infected?

Run a full scan. Download the latest definition files.

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (you account) is an administrative user. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. What else could you do to increase the security of this system?

Set a screensaver password. Disable autorun on the system.

A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. What's causing the problem?

She has enabled Num Lock, causing numbers to be sent from the keyboard instead of letters.

Which of the following are examples of social engineering?

Shoulder surfing. Dumpster diving.

You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to best prevent extracting data from the discs?

Shredding.

Which of the following security technologies stores identification information in either a magnetic strip, radio frequency transmitter, or hardware contacts to authorize access to a computer?

Smart card.

Which type of malicious activity can be described as numerous unwanted and unsolicited e-mail messages sent to a wide range of victims?

Spamming.

A security incident is currently occurring on the company network. You discover that the attack involves a computer system that is attached to the network. You're not sure yet exactly what kind of damage is being done to the network systems or data. What action should you take first?

Stop the attack and contain the damage by disconnecting the system from the network.

An intruder waits near an organization's secured entrance until an employee approaches the entrance and unlocks it with security badge. The intruder falls in line behind the employee, who assumes the intruder is another employee and holds the door open for her. What kind of attack just occurred?

Tailgating.

You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victim of a social engineering attack. What should you recommend they do to mitigate the risk?

Teach users how to recognize and respond to social engineering attacks.

What does the /a switch used with the copy command indicate?

That the files is an ASCII text file

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and Encryption. When the folder is copied, which of the following is true?

The R attribute is retained on the file.

You just bought a new computer. This system uses UEFI firmware and comes with Windows 10 preinstalled. You recently accessed the manufacturer's support website and saw that a UEFI firmware update has been released. You download the update. However, when you try to install the update, an error message is displayed indicating the digital signature on the update file is invalid. Why did this happen?

The update files has been tampered with.

Which of the following is not a form of biometrics?

Token device.

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. What recommendations would you make to this organization to increase their security?

Train the receptionist to keep her iPad in a locked drawer when not in use.

You have just installed anti-malware software on all computers on your company's network. Which additional actions should you take to help protect systems from malicious software?

Train users to scan removable storage devices before copying files. Configure the software to automatically update its definition files.

Which security measure can be used to generate and store cryptographic keys?

Trusted Platform Modules (TPM).

Which are examples of a strong password?

TuxP3nguinsRn0V3l. il0ve2EatIceCr3am.

You manage two computers with the following user accounts: -Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does. -Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not. You are working from Wrk2 and would like to access a shared folder on Wrk1. What credentials should you use to access the shared folder?

Type Admin for the username and specify the password.

While trying to log on, a user accidentally typed the wrong password three times, and now the system is locked because he entered too many incorrect passwords. He still remembers his password, but he just typed it wrong. He needs access as quickly as possible. What should you do?

Unlock the account.

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address you concerns?

Use cable locks to chain the laptops to the desks.

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. What should you do prior to getting rid of the computers?

Use data wiping software to clear the hard drives.

You have a hard disk that is formatted with the FAT32 files system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely. What should you do?

Use the convert command to convert from FAT32 to NTFS, then configure NTFS permissions.

What is the best countermeasure against social engineering?

User awareness training.

Which of the following is the most common form of authentication?

Username and password.

What does the rd command do when used with the /q switch?

Will not prompt you to confirm deletions

Which of the following permissions are not available when sharing a folder on a Windows 7 workstation?

Write. Modify.

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which format would you use?

\\Home1\Pictures

You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you're looking for. Which of the following commands will display the entire contents of the cpuinfo text file on the screen?

cat /proc/cpuinfo

You find that someone has set up an unauthorized account, with the username badmin, on the Linux server. You have disabled the account but you need to find out when and how this user has been gaining access to the system. The first step you decide to take is to inspect the contents of the /var/log/auth.log file to find information related to badmin logging into the system. Which command can you use to search through the auth.log for lines that contain the username you're looking for?

grep "badmin" /var/log/auth.log

You need to view the contents of /var/log/auth.log file to get information about the users that have been logging on to the system. The auth.log file is a plain text file so you decide to use the cat command to review the file. However, the display fills up with text for several pages and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page?

more /var/log/auth.log less /var/log/auth.log

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will confirm your suspicions?

net use

How can you see a list of valid commands parameters for the net use command?

net use /?

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

You are the administrator of a Linux server. Following best practices for system security and effective administration, you always login to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?

su -

Which command would you use to copy all files in a directory, including all subdirectories (as well as empty ones)?

xcopy /e


Set pelajaran terkait

ACV Death and Dying, ACV Exam 3, ACV Exam 2, ACV Exam 1

View Set

Chapter 10 Friendships in our lives

View Set

WIS 3401 Quiz Comp Spring 2023 Exam 1

View Set

CH 1 Introduction to enterprise systems for management

View Set

Exam 1 Development and Mobility

View Set

4. Specific Behavior Change Procedures

View Set