Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
What is the process for using or manipulating people to gain access to network resources? A. Cracking B. Hacking C. Network engineering D. Social engineering
|
D. Social engineering is the process of using or manipulating people to gain access to network resources. |
|
Which of the following might offer good hardware authentication? A. Strong passwords B. Encrypted passwords C. NTFS D. Smart cards
|
D. Smart cards are an example of hardware authentication devices. |
|
Which of the following tools would enable you to stop a user from logging on to a local machine but still enable him to log on to the domain? A. AD Policy Filter B. Group Policy Auditing C. Local Security Policy D. User Settings
|
C. You can use Local Security Policy to stop someone from logging on to a local machine. |
|
Which hardware firewall feature enables incoming traffic on a specific port to reach an IP address on the LAN? A. Port forwarding B. NAT C. DMZ D. Multifactor authentication
|
A. To open a port on your hardware firewall and send incoming traffic to a specific PC, use port forwarding. |
|
Zander downloaded a game off the Internet and installed it, but as soon as he started to play, he got a Blue Screen of Death. Upon rebooting, he discovered that his My Documents folder had been erased. What happened? A. He installed spyware. B. He installed a Trojan horse. C. He broke the Group Policy. D. He broke the Local Security Policy.
|
B. Zander clearly installed a Trojan horse, a virus masquerading as a game. |
|
Which of the following should Mary set up on her Wi-Fi router to make it the most secure? A. NTFS B. WEP C. WPA D. WPA2
|
D. Mary should set up WPA2 on her Wi-Fi router. |
|
What tool would you use to enable auditing on a local level? A. AD Policy B. Group Policy C. Local Security Policy D. User Settings
|
C. You can enable local auditing through Local Security Policy. |
|
John dressed up in a fake security guard uniform that matched the uniforms of a company and then walked in with some legitimate employees in an attempt to gain access to company resources. What kind of attack is this? A. Administrative access B. Data destruction C. Spoofing D. Tailgating
|
D. John just practiced tailgating on the unsuspecting company. |
|
The first day on the job, Jill received a spreadsheet that listed approved software for users and clear instructions not to allow any unapproved software. What kind of policy must she follow? A. Classification B. Compliance C. Group D. Security
|
B. Jill needs to enforce compliance to help keep the tech support calls at a minimum and the uptime for users at a maximum. |
|
Edna wants to put a policy in place at her company with regard to virus prevention or at least limitation. What policies would offer the best solution? A. Install antivirus software on every computer. Teach users how to run it. B. Install antivirus software on every computer. Set the software up to scan regularly. C. Install antivirus software on every computer. Set the software up to update the definitions and engine automatically. Set the software up to scan regularly. D. Install antivirus software on every computer. Set the software up to update the definitions and engine automatically. Set the software up to scan regu- larly. Educate the users about sites and downloads to avoid.
|
D. The best policy includes updating the software engine and definitions, scanning PCs regularly, and educating users. |