Sie sind auf Seite 1von 4

When accessing a website, a user is overwhelmed by popup windows that open faster than the user can close t

What is the most likely cause of this problem?


adware
phishing
spyware
Trojan

Which is the best way to secure a laptop left at the office while the user is away for an extended period of
2 Cover the laptop with files and leave it on your desk.
Put the laptop in a desk drawer in your locked office.
Place the laptop in a locked security cage designed to store computer equipment.
Hide the laptop in your supervisor's office.

3 Which procedure would be a valid password lockout rule?


An account should be locked out after a specific number of unsuccessful login attempts.
A password should be locked from public view.
A account should locked out after a random period of time.
A password should lock out a user from connecting to external networks

In which type of attack are TCP ports randomly opened to overload the network with a large number of fa
4 requests?
e-mail bomb attack
replay attack
spoofing attack
SYN flood attack

5 A company network has been subjected to several security attacks after installing TCP/IP on the company
computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user
and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deplo
man-in-the-Middle
ping of Death
replay
SYN Flood

What is the name given to code patterns of viruses?


6 grayware
mirrors
signatures
virus definition tables

7 Which task is in the scope of responsibilities of a network technician working with security updates and
patches?
submit a schedule to the manufacturer of when updates should be available
developing patches and updates
author signature files
installing patches and updates

What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the
8 recent viruses?
Download the latest signature files on a regular basis.
Schedule a scan once a week.
Schedule anti-virus updates using Windows Task Manager.
Follow the firewall configuration guidelines on the anti-virus manufacturer website.

9 A network administrator advised a user to use the postal service to mail a request for sensitive informatio
Which type of attack did the administrator want to prevent?
adware attack
DDoS attack
phishing attack
virus attack

1 Which feature of WPA makes it suitable for configuring wireless security?


0 It disables SSID broadcasting, which prevents unauthorized users from accessing the network.
It encrypts the data that is broadcast between the wireless access point and the wireless clients.
It restricts computer access to a wireless access point.
It transmits signals only within the network area.

11 Which attack can be accomplished by using phishing techniques?


DDoS attack
e-mail bomb attack
ping-of-death attack
social engineering attack

1 A computer that is configured for automatic updates is shut down during a scheduled update. However, t
2 update is downloaded successfully without any file being corrupted in the process. What will happen to t
update as a result of this shutdown?
Notification for downloading available updates will be displayed when the computer is rebooted.
The update will be lost.
The update for the computer will be queued on the website.
The update will be installed as soon as the computer is powered on.

13 Which two actions can improve the data backup process? (Choose two.)
Ensure that the backup tapes are sent to an offsite location once a month.
Ensure that the data is often restored on a test server.
Ensure that the responsibility for conducting backups is frequently changed between users.
Schedule full backups on a regular basis.
Schedule a full backup once a year.

1 Which functionality is normally expected from adware?


4 It is installed on the computer by the user.
It is usually distributed with downloaded software.
It monitors activity on the computer and sends this information to the organization that launched it.
It prevents opening of extra windows on the computer without the consent of the user.

15 Which precaution helps protect against social engineering in the workplace?


disclosing passwords to company personnel only
guiding visitors within the premises and escorting them personally when they leave
keeping hidden from public view any passwords that are posted in the work area
sharing access cards with other employees
16 An attacker has managed to decode the encrypted messages of a wireless network. The network uses Wi
XP and Cisco equipment. The security protocol that is used is WEP with 64-bit encryption. Which action
be recommended to the technician for securing the network?
Advise users to store their network authentication data, such as their passwords, in a secure manner.
Configure Windows update to run automatically, at a convenient time and on a regular basis.
Recover all sensitive data from the computers of the network, destroy their hard drives, and recycle
computers.
Upgrade to the LEAP wireless security protocol.

1 Which type of attack requires the use of passwords to gain access and run malicious programs?
7 spoofing attack
structured attack
SYN flood attack
unstructured attack
18 Which security device provides the highest level of security?
a biometric sensor
a card key
a key fob
a smart card

1 Which solution was designed to provide security for WAP devices in a bandwidth-efficient manner?
9 LEAP
WEP
WPA
WTLS

20 Which two practices help prevent unwanted access to data on a wireless network? (Choose two.)
changing the default administrator password
enabling the broadcasting of SSID
filtering the MAC addresses of computers
retaining the original firmware on all wireless devices
using 64-bit encryption as per the WEP standard
13.14.15.17.18

Das könnte Ihnen auch gefallen