Professional Documents
Culture Documents
patches that prevent a newly discovered virus or worm from making a successful attack
mirror sites
• 9.4.1 Explain how to update signature files for anti-virus and anti-spyware software
3 Which feature is characteristic of adware?
It is a subset of spyware.
It is a harmful virus that can corrupt the entire data on the network.
It is displayed in popup windows, which open faster than the user can close them.
data encryption
firewall protection
port protection
DoS
e-mail bomb
ping of death
includes journaling
virus definitions
• 9.4.2 Explain how to install operating systems service packs and security patches
9 What is a good practice to prevent an unauthorized user from guessing a password and accessing an account?
disabling account lockout status within the network
enabling a user account only after issuing a password to the user over the phone
locking out the account after a small, finite number of unsuccessful attempts
setting the user account password to be left blank for the first login
• 9.3.3 Describe ways to protect data
10 What is accomplished by a successful DoS attack?
It facilitates access to external networks.
Signals are prevented from transmission outside the boundaries of the local network.
Event Viewer
secure DNS
smart card
UNC
card keys
security cages
smart card
obtaining the directory of a competitor company that contains the e-mail addresses of all the employees of that company
researching reviews and other articles about the performance of a competitor company
16 Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time?
Secure by a security cable wrapped around the leg of the user's desk.
Put the laptop in a desk drawer in the locked office of the user.
Place the laptop in a locked security cage designed to store computer equipment.
18 Which three questions should be addressed by organizations developing a security policy? (Choose three.)
What items need to be protected?
Change the firewall rules to enable the installer to access port 8900 of the Microsoft server.
• 9.4.2 Explain how to install operating systems service packs and security patches
20 Which best practice should be included in a password protection policy?
Encourage users to document passwords in a personal file.
Enforce password protection at either the BIOS level or the network login level.
Passwords should contain a mixture of letters and numbers so that they cannot easily be broken.
biometric
keylogging
secureware
smartcard
WPA
WTLS
spyware
stealth virus
trojan horse
pop-up blocker
spyware
grayware
Is self-replicating.
phishing
physical
social engineering
spoofing
• 9.2.6 Explain social engineering
7 Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time?
Secure by a security cable wrapped around the leg of the user's desk.
Put the laptop in a desk drawer in the locked office of the user.
Place the laptop in a locked security cage designed to store computer equipment.
DDoS
phishing
spoofing
SYN flood
• 9.2.4 Explain Denial of Service
11 Which two statements are true about username and password standards? (Choose two.)
The username naming convention should be kept simple.
BIOS passwords should be given to users to enable them to configure their computer.
• 9.4.1 Explain how to update signature files for anti-virus and anti-spyware software
14 Which two items can be downloaded from the Microsoft website to help protect Windows XP? (Choose two.)
ROM upgrades
service packs
security patches
BIOS upgrades
DirectX updates
• 9.4.2 Explain how to install operating systems service packs and security patches
15 What is the difference between WEP64 and WEP128?
WEP64 can handle 64 simultaneous connections, and WEP128 can handle 128 simultaneous connections.
WEP64 operates on a 64-bit processor, but WEP128 requires a dual core 128-bit processor.
WEP64 uses a 64-bit encryption key, and WEP128 uses a 128-bit key.
Change the firewall rules to enable the installer to access port 8900 of the Microsoft server.
• 9.4.2 Explain how to install operating systems service packs and security patches
18 Which best practice should be included in a password protection policy?
Encourage users to document passwords in a personal file.
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
phishing
spyware
trojan
free software
grayware
spyware
It monitors activity on the computer and sends this information to the organization that launched it.
It prevents opening of extra windows on the computer without the consent of the user.
ping of death
replay
SYN flood
Configure Windows update to run automatically, at a convenient time and on a regular basis.
Recover all sensitive data from the computers of the network, destroy their hard drives, and recycle the computers.
DDoS attack
phishing attack
virus attack
ping-of-death attack
social engineering attack
mirrors
signatures
9.4.1 Explain how to update signature files for anti-virus and anti-spyware
software
10 When accessing a website, a user is overwhelmed by popup windows that open faster than the user can close
them. What is the most likely cause of this problem?
adware
phishing
spyware
Trojan
a card key
a key fob
a smart card
9.3.2 Explain the tasks required to protect physical equipment
12 Which two procedures can help secure data backups? (Choose two.)
Only perform full backups.
Ensure that the responsibility for conducting backups is frequently changed among users.
13 A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file
being corrupted in the process. What will happen to the update as a result of this shutdown?
Notification for downloading available updates will be displayed when the computer is rebooted.
• 9.4.2 Explain how to install operating systems service packs and security patches
14 A company uses computers and wireless access points from a variety of different suppliers. Which wireless security protocol should the company use to achieve
the best level of security?
LEAP
WEP
WPA
WTLS
guiding visitors within the premises and escorting them personally when they leave
keeping hidden from public view any passwords that are posted in the work area
replay attack
spoofing attack
It encrypts the data that is broadcast between the wireless access point and the wireless clients.
adware
grayware
spam
• 9.4.1 Explain how to update signature files for anti-virus and anti-spyware software
20 Which two actions improve security on a wireless network? (Choose two.)
Enable WEP.