Gmetrix test 2

Ace your homework & exams now with Quizwiz!

A person buying something securely from a website will receive a private key to use to encrypt sensitive data. A different private key is used to decrypt the data.

public, private

Malware that steals and encrypts data and demands money for the return of the data is known as what type of malware?

ransomeware

The process of eliminating a risk by choosing not to participate in an action or activity describes which of the following?

risk avoidance

In the Information Technology field, impersonation, such as a person impersonating a help desk agent and asking for a password, is a type of

social engineering

Which area of Group Policy can be used to control apps that can be run on devices?

AppLocker

RADIUS is an authentication method that identifies individuals based on physical characteristics such as fingerprints, facial recognition, retina scans, or voice patterns.

Biometrics

Which Windows tool is used to encrypt removable drives?

BitLocker To Go

Several users have called the help desk to complain that they are being redirected to websites different from the addresses they entered. Which type of attack is taking place?

DNS spoofing

Where are password policies established for an Active Directory?

Group Policy

Which protocols are considered unsecure and should be avoided in a server environment?

PAP and Telnet

Which types of lists can be used as part of an antispam solution?

RBLs and DNSBLs

Which protocol should be allowed only on email servers used to send email and should be blocked on all other servers and client machines?

SMTP

The IEEE 802.11 standard defines the name for a WLAN as the

SSID

Which type of VPN will often have a user connect through a web browser? Which type of VPN connection usually connects two business entities?

SSL site-to-site

BitLocker, when possible, stores the encryption key on a computer's EFS.

TPM

Which three characteristics describe Worms?

Uses system resources like bandwidth, memory, and processor time, which makes the computer run slow; typically does not corrupt or modify files; a self-replicating program that copies itself to other computers without user intervention

NAS provides secure access to a network over the Internet.

VPN

You recently purchased a new home router and a new laptop computer. You want to connect to your personal Home Router using the strongest security available. On your computer, you open the wireless window manually configure a profile as shown in the following image:

WPA2 AES

Which servers/server apps can be used to push Windows updates to client machines?

WSUS and SCCM

Which Windows app is used to help protect a device against malware?

Windows Defender

Protocol spoofing monitors packet traffic on a network and reports the sender, destination, and type of packet.

a network sniffer

Digital certificates are electronic documents that contain an identity as a user name or organization, along with

a public key

Your email program is blocking emails from a certain sender. What is the best option?

add the sender to a whitelist

You want to share a folder on your computer titled, Facebook Photos, with a group on your home network called, HomeUsers. You want to implement the principle of least privileges to allow them access to see your photos and add new photos to the folder, but not delete any photos. The security permissions existing on this folder are displayed in the following images:

change Allow the list folder contents, read, and write

To which part of the of the CIA triangle does "encrypt a nonvolatile storage unit" apply?

confidentiality

Which two types of attacks are at least somewhat thwarted with the use of the account lockout policy?

dictionary and brute force attack

Which of the following are specific types of audits?

directory service access, logins, and policy changes

Which password policy prohibits reusing the same password?

history policy

Conveys the bit stream through the network at the physical level. Handles the addressing and routing of packets across networks. Sets up, coordinates, and terminates conversations between computers. Interacts with software applications, identifies communication partners, and determines resource availability.

layer 1, layer 3, layer 5, layer 7

When enabling Secure Dynamic DNS, who can create records on a DNS server?

members of an active directory

A buffer overflow is an attempt to fit an amount of data into a memory space that is too small to handle the data.

no change is needed

Asymmetric encryption used a single key to perform encryption and decryption. DES is an asymmetric encryption algorithm. RSA is an asymmetric encryption algorithm

no, no, yes

A VPN should use PPTP for tunneling. A VPN connects two entities over a wide area network, like the Internet. A VPN encapsulates and encrypts date to provide a secure connection.

no, yes, yes

RADIUS is Cisco-proprietary. RADIUS performs centralized authentication. RADIUS provides auditing services

no, yes, yes

What is a benefit of the SmartScreen Filter built into Internet Explorer and Microsoft Edge?

phishing protection

Which is the most important security consideration for a company's servers? Which type of device tends to have the least amount of consideration given for physical security?

physical location desktops

A department head wants to control the types of permissions and the recipient of permissions on a set of folders for the department. The department head is not in the Administrators group. What should the department head do in the order to be able to control permissions?

take ownership of the folder

A junior administrator notices, when looking at a folder's permissions, gray check boxes in the allow column for a group's permissions. What do the gray check boxes means?

the permissions are inherited

A digital signature included in an email is used to

validate the sender

Once it has been determined what will be audited and where the audit files will be stored, what should be taken into consideration?

who has access to the logs

Application-level firewalls can provide content filtering and virus protection. Application-level firewalls tend to be less resource-intensive than that of a traditional firewall. Application-level firewalls support caching.

yes, no, yes

The Delegation of Control Wizard is found in Active Directory Users and Computers. Users and groups can be delegated to a resource using the Delegation of Control Wizard. Organizational Units can be delegated to a resource using the Delegation of Control Wizard

yes, no, yes

The tool used to view audit logs is Event Viewer? You can audit logon failures to warn of hacking attacks. You cannot limit the size of audit logs.

yes, yes, no

Trojan horses appear to be legitimate apps. Worms are self-replicating programs to slow a computer by overusing its system resources. Spyware is a government developed virus used in espionage.

yes, yes, no


Related study sets

OSCE Sensory/Cognitive/Vision/Motor Test

View Set

SSCI 316— Chapter 7 Study Guide

View Set

Sociology Unit Test 3 (Chapter 7, 9-11)

View Set

Chapter 11 - Measuring the Cost of Living

View Set

DIFFERENT LANGUAGES FOR SAYING HELLO

View Set