Académique Documents
Professionnel Documents
Culture Documents
1 Account lockout policies are used to prevent which type of security attack?
A)Social Engineering
B)users sharing passwords
D
C)passwords being reused immediately
D)brute force attacks
D)tunnel that prevents information that passes through it from being modified or
stolen
5
For each of the following statements, select Yes if the statement is true. Otherwise
select No Yes No
A)There are built-in basic audit policies and advanced audit policies in Windows Yes
B)Advanced audit policies applied by a Group Policy are compatible with a basic audit Yes
C)A system access control list(SACL) enables administrators to log attempts to access a secured object Yes
A)A longer minimum password length reduces the chance that the password will be brute forced Yes
B)A minimum password length of zero will allow the user to skip setting a password Yes
C)Setting too large of a minimum password length can create social engineering vulnerabilities No
8 For each of the following statements , select Yes if the statement is true. Otherwise, select No. Yes No
Note : Each correct selection is worth one point.
A)You can view audit logs in the Event Viewer Yes
B)Audit logs have a set size limit and cannot be adjusted Yes
C)You can configure an email event notification for an audited activity Yes
The manager of a coffee shop hires you to securly setup WiFi in the
shop. To keep
11
computer users from seeing each other, what should you use with an
access point?
A)MAC address filtering
B)client mode
C)client bridge mode
B
D)client isolation mode
12
An attorney hires you to increase the wireless network security for the law firm's
office. The office has a very basic network , with just a modem and a router.
Which of these security modes offers the highest security?
A)WEP
C
B)WPA-Personal
C)WPA2-Personal
C
D)WPA-Enterprise
You receive an email message from a friend that directs you to delete a system file. What should
13
you do?
A)Run windows update to check the file
B)Warn your friend he is delivering a hoax.
C)Warn your friend he is delivering a phishing scam
D
D)Quarantine the system file and replace it with a clean version
A manager at Coho Winery asks you to look at the wireless setup for the office because they are worried
about security. They are using a consumer router with a button on the router that initiates a secure
14
wireless connection, without the use of a passphrase, for devices that support this feature. You turn this
feature off because of known vulnerabilities. What is this feature?
A)WPS
B)WME
C)EAS D
D)WPA
E)WEP
16
What does the SmartScreen Filter feature of the Microsoft Edge browser do?
A)pre-selects news articles relevant to your interests
B)requests that websites do not track your usage of the site
C)automatically magnifies parts of a website you are viewing
D
D
D)blocks websites and content that are known to be malicious
17
What enables access to all of the logged-in user's capabilities on a computer?
A)AciveX controls
B)Microsoft Silverlight
C)Java applets
A
D)Active Server Pages(ASP)
19
Which two vulnerabilities is a wireless network client exposed to? (Choose two.)
A)rogue access points
B)buffer overflow
C)eavesdropping
A,C
D)file corruption
This question requires that you evaluate the underlined text to determine if it is
correct. An
example of physical security for a laptop is a/an cable lock
20
Instructions : Review the underline text if it makes the statement correct select "No
change is needed." If the statement is incorrec, select the answer choice that
makes the statement correct
A)external USB drive
B)docking station
C
C)No change is needed
C
D)fingerprint reader
You are trying to connect to an FTP server on the Internet from a computer in a
22
school lab. You cannot get a connection. You try on another computer with the
same results. The computers in the lab are able to browse the Internet.
You are able to connect to this FTP server from home. What
could be blocking the connection to the server?
A)a wireless access point
B)a firewall
C)a layer-2 switch
B
D)a layer-2 hub
An attacker sends a message from a distant computer that looks like it originated
25
from your computer because it has your IP address?
A)man-in-the-middle
B)application-layer attack
C)protocol spoofing
A
D)denial of service
This question requires that you evaluate the underlined text to determine if it is correct. Dedicated
perimeter firewalls often provide a service named static packet filtering Which converts internal private
27 addresses into external internet address. Review the underline text. If it makes the
statement correct, select "No change is needed." If the statement is incorrect, select the answer choice
that makes the statement correct.
A)circuit-level inspection
B)No change is needed.
C)Application Layer filtering
D
D)Network Address Translation
The question requires that you evaluate the underline text to determine if it is correct. Tunneling is the
concept of removing random data from a packet Instructions: Review the underlined
text. If it makes the statement correct. select "No change is needed." If the statement is incorrect , select
the answer choice that makes the statement correct.
28
A)creating a destination for fake packets.
B)placing one packet inside another.
B
C)building hidden network links among servers
B
D)No change is needed
30
Your company maintains a web server that is accessible to the public. It should be placed in a/an:
A)perimeter network
B)Virtual Private Network(VPN).
C)enterprise domain.
A
D)primary DNS zone
The question requires that you evaluate the underline text to determine if it is correct. Bridging is a
process of sending packets from source to destination on OSI layer 3. Instructions: Review the
31
underlined text. If it makes the statement correct. select "No change is needed." If the statement is
incorrect , select the answer choice that makes the statement correct.
A)Switching
B)No change is needed.
C)Repeating
D
D)Routing
A)scheduled scanning A
B)on demand scanning
C)attack surface scanning B
D)packet scanning
36 How does the servers policy framework(SPF) aim to reduce spoofed email?
A)it lists servers that may legimately forward mail for a particular domain
B)it includes an XML policy file with each email that coonfirms the validity of the message C
C)it provides a list IP address ranges for particular domains so senders can be verified
D)it provides an encryption key so that authenticity of an email message can be validated
37 This question requires that you evaluate the underlined text to determine if it is correct.
To determine which action, if any to take on an inbound message,
antispam and antivirus recipient inspects the IP address of the server that is trying to send the messages
a)sender
b)no change is needed
c)content D
d)connection
40 This question requires that you evaluate the underlined text to determine if it is correct.
You are volunteering at an organization that gets a brand new web server.
To make the server more secure, you should add a second administrator account
41 You need to grant a server administrator full provilages to a server in the domain
by using the the administrator's own user account. This account does not have administrative
privilages to the domain which two objects should you use?
a)local user
b)loacl group B
c)local security policy
d)domian user D
messages