Gmetrix test 2
A person buying something securely from a website will receive a private key to use to encrypt sensitive data. A different private key is used to decrypt the data.
public, private
Malware that steals and encrypts data and demands money for the return of the data is known as what type of malware?
ransomeware
The process of eliminating a risk by choosing not to participate in an action or activity describes which of the following?
risk avoidance
In the Information Technology field, impersonation, such as a person impersonating a help desk agent and asking for a password, is a type of
social engineering
Which area of Group Policy can be used to control apps that can be run on devices?
AppLocker
RADIUS is an authentication method that identifies individuals based on physical characteristics such as fingerprints, facial recognition, retina scans, or voice patterns.
Biometrics
Which Windows tool is used to encrypt removable drives?
BitLocker To Go
Several users have called the help desk to complain that they are being redirected to websites different from the addresses they entered. Which type of attack is taking place?
DNS spoofing
Where are password policies established for an Active Directory?
Group Policy
Which protocols are considered unsecure and should be avoided in a server environment?
PAP and Telnet
Which types of lists can be used as part of an antispam solution?
RBLs and DNSBLs
Which protocol should be allowed only on email servers used to send email and should be blocked on all other servers and client machines?
SMTP
The IEEE 802.11 standard defines the name for a WLAN as the
SSID
Which type of VPN will often have a user connect through a web browser? Which type of VPN connection usually connects two business entities?
SSL site-to-site
BitLocker, when possible, stores the encryption key on a computer's EFS.
TPM
Which three characteristics describe Worms?
Uses system resources like bandwidth, memory, and processor time, which makes the computer run slow; typically does not corrupt or modify files; a self-replicating program that copies itself to other computers without user intervention
NAS provides secure access to a network over the Internet.
VPN
You recently purchased a new home router and a new laptop computer. You want to connect to your personal Home Router using the strongest security available. On your computer, you open the wireless window manually configure a profile as shown in the following image:
WPA2 AES
Which servers/server apps can be used to push Windows updates to client machines?
WSUS and SCCM
Which Windows app is used to help protect a device against malware?
Windows Defender
Protocol spoofing monitors packet traffic on a network and reports the sender, destination, and type of packet.
a network sniffer
Digital certificates are electronic documents that contain an identity as a user name or organization, along with
a public key
Your email program is blocking emails from a certain sender. What is the best option?
add the sender to a whitelist
You want to share a folder on your computer titled, Facebook Photos, with a group on your home network called, HomeUsers. You want to implement the principle of least privileges to allow them access to see your photos and add new photos to the folder, but not delete any photos. The security permissions existing on this folder are displayed in the following images:
change Allow the list folder contents, read, and write
To which part of the of the CIA triangle does "encrypt a nonvolatile storage unit" apply?
confidentiality
Which two types of attacks are at least somewhat thwarted with the use of the account lockout policy?
dictionary and brute force attack
Which of the following are specific types of audits?
directory service access, logins, and policy changes
Which password policy prohibits reusing the same password?
history policy
Conveys the bit stream through the network at the physical level. Handles the addressing and routing of packets across networks. Sets up, coordinates, and terminates conversations between computers. Interacts with software applications, identifies communication partners, and determines resource availability.
layer 1, layer 3, layer 5, layer 7
When enabling Secure Dynamic DNS, who can create records on a DNS server?
members of an active directory
A buffer overflow is an attempt to fit an amount of data into a memory space that is too small to handle the data.
no change is needed
Asymmetric encryption used a single key to perform encryption and decryption. DES is an asymmetric encryption algorithm. RSA is an asymmetric encryption algorithm
no, no, yes
A VPN should use PPTP for tunneling. A VPN connects two entities over a wide area network, like the Internet. A VPN encapsulates and encrypts date to provide a secure connection.
no, yes, yes
RADIUS is Cisco-proprietary. RADIUS performs centralized authentication. RADIUS provides auditing services
no, yes, yes
What is a benefit of the SmartScreen Filter built into Internet Explorer and Microsoft Edge?
phishing protection
Which is the most important security consideration for a company's servers? Which type of device tends to have the least amount of consideration given for physical security?
physical location desktops
A department head wants to control the types of permissions and the recipient of permissions on a set of folders for the department. The department head is not in the Administrators group. What should the department head do in the order to be able to control permissions?
take ownership of the folder
A junior administrator notices, when looking at a folder's permissions, gray check boxes in the allow column for a group's permissions. What do the gray check boxes means?
the permissions are inherited
A digital signature included in an email is used to
validate the sender
Once it has been determined what will be audited and where the audit files will be stored, what should be taken into consideration?
who has access to the logs
Application-level firewalls can provide content filtering and virus protection. Application-level firewalls tend to be less resource-intensive than that of a traditional firewall. Application-level firewalls support caching.
yes, no, yes
The Delegation of Control Wizard is found in Active Directory Users and Computers. Users and groups can be delegated to a resource using the Delegation of Control Wizard. Organizational Units can be delegated to a resource using the Delegation of Control Wizard
yes, no, yes
The tool used to view audit logs is Event Viewer? You can audit logon failures to warn of hacking attacks. You cannot limit the size of audit logs.
yes, yes, no
Trojan horses appear to be legitimate apps. Worms are self-replicating programs to slow a computer by overusing its system resources. Spyware is a government developed virus used in espionage.
yes, yes, no