Vous êtes sur la page 1sur 21

S.

No CYBER SECURITY QUESTIONS Answer

1 Account lockout policies are used to prevent which type of security attack?
A)Social Engineering
B)users sharing passwords
D
C)passwords being reused immediately
D)brute force attacks

2 Which password attack uses all possible alphanumeric combinations


A)brute force attack
B)rainbow table attack A
C)social engineering
D)dictionary attack

3 Which type of computer virus attempts to defeat signature - based antimalware


tools by adding random junk data to the library image of the virus executable?
A)Trojan horse
B)rootkit
D
C)ransomware
D)polymorphic virus

4 A Virtual Private Network(VPN) is a/an :


A)Intrusion Prevention System that filters unauthorized communications in the
enterprise network
B)virtual communication method that stores data transmitted in a private
environment D
C)Perimeter network that contains secure virtual servers
D

D)tunnel that prevents information that passes through it from being modified or
stolen

5
For each of the following statements, select Yes if the statement is true. Otherwise
select No Yes No
A)There are built-in basic audit policies and advanced audit policies in Windows Yes
B)Advanced audit policies applied by a Group Policy are compatible with a basic audit Yes

C)A system access control list(SACL) enables administrators to log attempts to access a secured object Yes

You need to be able to gather information about a running program.Which type of


6 auditing should you implement
A)process tracking
B)directory services
D
C)logon events
D)object access

You are helping your classmates with their password settings.


7 Instructions : For each of the following statements, select Yes if the statements is Yes No
true . Otherwise, select No. Each correct

A)A longer minimum password length reduces the chance that the password will be brute forced Yes
B)A minimum password length of zero will allow the user to skip setting a password Yes

C)Setting too large of a minimum password length can create social engineering vulnerabilities No

8 For each of the following statements , select Yes if the statement is true. Otherwise, select No. Yes No
Note : Each correct selection is worth one point.
A)You can view audit logs in the Event Viewer Yes
B)Audit logs have a set size limit and cannot be adjusted Yes
C)You can configure an email event notification for an audited activity Yes

You suspect a user's computer is infected by a virus.


9
What should you do first?
A)Disconnect the computer from the network.
B)Install antivirus software on the computer.
C)Replace the computer's hard disk drive
D
D)Restart the computer in safe mode

10 The purpose of a digital certificate is to verify that a :


A)private key belongs to a sender
B)public key belongs to a sender
C)digital document is complete
B
D)computer is virus-free

The manager of a coffee shop hires you to securly setup WiFi in the
shop. To keep
11
computer users from seeing each other, what should you use with an
access point?
A)MAC address filtering
B)client mode
C)client bridge mode
B
D)client isolation mode

12
An attorney hires you to increase the wireless network security for the law firm's
office. The office has a very basic network , with just a modem and a router.
Which of these security modes offers the highest security?
A)WEP

C
B)WPA-Personal
C)WPA2-Personal
C
D)WPA-Enterprise

You receive an email message from a friend that directs you to delete a system file. What should
13
you do?
A)Run windows update to check the file
B)Warn your friend he is delivering a hoax.
C)Warn your friend he is delivering a phishing scam
D
D)Quarantine the system file and replace it with a clean version

A manager at Coho Winery asks you to look at the wireless setup for the office because they are worried
about security. They are using a consumer router with a button on the router that initiates a secure
14
wireless connection, without the use of a passphrase, for devices that support this feature. You turn this
feature off because of known vulnerabilities. What is this feature?
A)WPS
B)WME
C)EAS D
D)WPA
E)WEP

15 Encrypting a hard disk is an example of ensuring :


A)security by default
B)least privilege
C)integrity
D
D)Confidentiality

16
What does the SmartScreen Filter feature of the Microsoft Edge browser do?
A)pre-selects news articles relevant to your interests
B)requests that websites do not track your usage of the site
C)automatically magnifies parts of a website you are viewing
D
D
D)blocks websites and content that are known to be malicious

17
What enables access to all of the logged-in user's capabilities on a computer?
A)AciveX controls
B)Microsoft Silverlight
C)Java applets
A
D)Active Server Pages(ASP)

18 Media Access Control(MAC) filtering enables you to :


A)set access permissions to a shared folder.
B)restrict communications to a specific website.
C)limit access to a network based on the client computer's network adapter.
C
D)prevent communications between specific IP addresses.

19
Which two vulnerabilities is a wireless network client exposed to? (Choose two.)
A)rogue access points
B)buffer overflow
C)eavesdropping
A,C
D)file corruption

This question requires that you evaluate the underlined text to determine if it is
correct. An
example of physical security for a laptop is a/an cable lock
20
Instructions : Review the underline text if it makes the statement correct select "No
change is needed." If the statement is incorrec, select the answer choice that
makes the statement correct
A)external USB drive
B)docking station
C
C)No change is needed
C
D)fingerprint reader

For each of the followoing statements, select Yes if the statements is


21 Yes No
true. Otherwise, select No.
A)IPsec Requires network applictions to be Ipsec aware Yes
B)IPsc encrypts data Yes
C)IPsec adds overhead for all network communications for which it is used No

You are trying to connect to an FTP server on the Internet from a computer in a
22
school lab. You cannot get a connection. You try on another computer with the
same results. The computers in the lab are able to browse the Internet.
You are able to connect to this FTP server from home. What
could be blocking the connection to the server?
A)a wireless access point
B)a firewall
C)a layer-2 switch
B
D)a layer-2 hub

23 Which is a common method for password collection?


A)SQL Injection
B)network sniffers
C)back door intrusions
B
D)email attachments

24 What does NAT do?


A)It analyzes incoming and outgoing traffic packets
B)It translates public IP addresses to private addresses and vice versa.
C)It provides caching and reduces network traffic.
B
B
D)It encrypts and authentication IP packets.

An attacker sends a message from a distant computer that looks like it originated
25
from your computer because it has your IP address?
A)man-in-the-middle
B)application-layer attack
C)protocol spoofing
A
D)denial of service

26 A network sniffer is software or hardware that :


A)catalogs network data to create secure index.
B)records user activity and transmits it to the server.
C)captures and analyzes network communication.
C
D)protects workstations from intrusions.

This question requires that you evaluate the underlined text to determine if it is correct. Dedicated
perimeter firewalls often provide a service named static packet filtering Which converts internal private
27 addresses into external internet address. Review the underline text. If it makes the
statement correct, select "No change is needed." If the statement is incorrect, select the answer choice
that makes the statement correct.
A)circuit-level inspection
B)No change is needed.
C)Application Layer filtering
D
D)Network Address Translation

The question requires that you evaluate the underline text to determine if it is correct. Tunneling is the
concept of removing random data from a packet Instructions: Review the underlined
text. If it makes the statement correct. select "No change is needed." If the statement is incorrect , select
the answer choice that makes the statement correct.
28
A)creating a destination for fake packets.
B)placing one packet inside another.
B
C)building hidden network links among servers
B
D)No change is needed

29 In which two ways does Ipsec protect communications? (Choose two.)


A)routes packets to a secure channel
B)stores the network private key securely
C)authenticates the IP header C,E
D)blocks unauthorized content transmission
E)encrypts the data payload

30
Your company maintains a web server that is accessible to the public. It should be placed in a/an:
A)perimeter network
B)Virtual Private Network(VPN).
C)enterprise domain.
A
D)primary DNS zone

The question requires that you evaluate the underline text to determine if it is correct. Bridging is a
process of sending packets from source to destination on OSI layer 3. Instructions: Review the
31
underlined text. If it makes the statement correct. select "No change is needed." If the statement is
incorrect , select the answer choice that makes the statement correct.

A)Switching
B)No change is needed.
C)Repeating
D
D)Routing

32 The purpose of User Account Control(UAC) is to :


A)encrypt the user's account.
B)facilitate internet filtering
C)limit the privileges of software.
C
D)secure your data from corruption
33 Certain potentially harmful file types should be filtered as attachments of incoming email messages.

file extension answer area

.js compiled programs excecutable on windows computer .exe


xslx batch scripts excecutable on windows computers .cmd
.exe script excecutable om websites and windows computers .js
.cmd
.png

34 Which two are included in an enterprise antivirus program?(choose two)

A)scheduled scanning A
B)on demand scanning
C)attack surface scanning B
D)packet scanning

35 Email bombng attacks a specific entity by:

A)Triggering high level if security alerts


B)redirecting all emails to another entity
c)sending high volumes of email
c
tracing email to the destintion address

36 How does the servers policy framework(SPF) aim to reduce spoofed email?
A)it lists servers that may legimately forward mail for a particular domain
B)it includes an XML policy file with each email that coonfirms the validity of the message C
C)it provides a list IP address ranges for particular domains so senders can be verified
D)it provides an encryption key so that authenticity of an email message can be validated

37 This question requires that you evaluate the underlined text to determine if it is correct.
To determine which action, if any to take on an inbound message,
antispam and antivirus recipient inspects the IP address of the server that is trying to send the messages

a)sender
b)no change is needed
c)content D
d)connection

38 Windows Server Update Services(WSUS) is a tool that:

a)manages updates for Microsoft software


b)updates data stored in windows servers
c)manages the srevices that run on a server A
d)updates licensing for windows servers

40 This question requires that you evaluate the underlined text to determine if it is correct.
You are volunteering at an organization that gets a brand new web server.
To make the server more secure, you should add a second administrator account

A)disable unused services


B)no change is needed A
C)enable LM authentication
D)enable NTLM authentication

41 You need to grant a server administrator full provilages to a server in the domain
by using the the administrator's own user account. This account does not have administrative
privilages to the domain which two objects should you use?

a)local user
b)loacl group B
c)local security policy
d)domian user D
messages

Vous aimerez peut-être aussi