• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/92

Click to flip

92 Cards in this Set

  • Front
  • Back
What is the most effective password for user one?
a. User$one
b. Passwordone
c. Userone
d.User0
User$one
Remember, Passwords should be at least 8 characters long, a mixture of upper and lower case, non-words and symbols.
You want to transfer data securely over a WAN, how can this be accomplished?
- Encrypt Data before sending
NTFS allows you to compress ____.
(choose three)
- individual files
- folders
- an entire volume
What accurately complete this sentence, " the more complex your password is_____."( Choose two)
- The more secure it is.
- The harder it is to remember.
What provided supports various authentication methods including Smart Cards, Certificates, Kerberos and one-time passwords?
EAP
The Extensible Authentication Protocol (EAP) provides authentication support for several methods. Among them are digital certificates, smart cards, one-time passwords
WEP uses an asymmetrical key to identify wireless devices.
a. true
b. false
false
Many Trojan horse viruses use the tactics of social engineering to induce the victims into opening and executing the payload. Which method listed below would reduce the threat of Trojan horse propagation while still allowing users to perform the functions of their job?
- A clear organizational policy regarding e-mail attachments.
When a Windows XP client is configured as part of a domain and the authentication fails the user will:
- Not be able to log on to the local computer or the network.
Which wireless security protocol was designed to simulate the physical security of a wired LAN?
- WEP
Wired Equivalent Privacy (WEP) encrypts and secures wireless data transmissions between clients and access points in WLANS.
What is broadcast in the clear on wireless LANs? (Choose three.)
- MAC address
- SSID
- Beacon frames
When a Windows 2000 client is configured as part of a domain, the password will be authenticated by the:
- Domain controller.
What are good security tips for the administrator of a network? (Choose three)
- Have an attack plan in place.
- Never attach a server to the Internet without a firewall.
- Do not leave any old accounts on the network.
You are the network technician for WestCoastMovies and are working the help desk. You have a user who is having problems connecting to a web site on the internet from his Windows XP laptop computer. You want to check his connection to the web site, which of the following commands will you use?
- TRACERT
Tracert can be used to trace a route between the workstation and the web server hosting the web page in question. It will include information about the connectivity and speed, so it will show where the bottleneck is occurring.
When using Biometric authentication, it is possible for an unauthorized person to be granted access to the system. What is this condition called?
- False Positive
What types of backups backs up all selected files and marks them as having been backed up?
Full
Remember, when making backups onto any medium. It is important to backup regularly. Microsoft recognizes five types of backup strategies: Full backup: Copies all selected files to tape unconditionally. Incremental backup: Copies all files changed since the last full or incremental backup. Differential backup: Copies all files changed since the last full backup. Copy backup: Copies selected files to tape without resetting the archive bit Daily backup: Copies all files changed the day the backup is made.
The Windows XP ____ feature, which can only be used with NTFS, uses a public key encryption scheme to encrypt files and folders.
- EFS
The Windows 2000/XP Encrypted File System incorporates public key encryption to enable users to create private files that can't be read by other users.
Because of the advances in today's security systems user names and passwords are now adequate security requirements for sensitive material.
a. true
b. false
- False
You are sent into the server area for some maintenance work and you notice a large amount of water on the floor. Which of the following actions will you take?
- Call your system admin
Which of the following should be considered essential security practices?
a. virus protection
b. software protection
c. software firewall
d. all of these
e. Encrypted file system
All of these
What are the three types of filtering that can be performed on a wireless LAN? (Choose three.)
- MAC address filtering
- SSID filtering
- Protocol filtering
You are about to connect a PC to the Internet for the first time. Which of the following should you do before you connect it? (Choose two)
- Install all Updates
- Install Antivirus
What types of backups backs up all selected files without marking them as having been backed up?
- Copy
Remember, when making backups onto any medium, it is important to backup regularly. Microsoft recognizes five types of backup strategies: Full backup: Copies all selected files to tape unconditionally. Incremental backup: Copies all files changed since the last full or incremental backup. Differential backup: Copies all files changed since the last full backup. Copy backup: Copies selected files to tape without resetting the archive bit Daily backup: Copies all files changed the day the backup is made.
On which of the following security schemes should wireless networks user authentication be based? (Choose three.)
- Biometrics
- Smart cards
- RADIUS
What are the differences of user level security compared to share level security?
- Accounts and privileges are centrally administered
Which WI-Fi security protocol provides better protection?
- WPA
When WEP was found to be less secure than initially anticipated Wi-Fi Protected Access was developed to enhance the security of User Authentication using EAP, and add a more secure encryption method with TKIP.
A wireless DMZ is located on which network device?
- Firewall
What represents the greatest risk pertaining to a discarded Hard Drive?
- Data recovery by 3rd party
A firewall is a hardware device used to provide network security. A software firewall will not properly protect the computer.
a. true
b. false
- False
What correctly identifies a document that addresses an organizations security needs and describes what types of activities are permitted?
- Security policy
Which of the following should be considered essential security practices?
a. virus protection
b. spy-ware protection
c. install all critical updates
d. all of these
e. update to latest server pack
all of these
What correctly identifies a policy that addresses how to deal with a security incident after that incident has happened?
- Incident response policy
What is the default location of the directory that local user profile settings are stored in Windows 2000?
- C:\Documents and Settings.
What can provide some protection for your network from outside invaders? (Choose three)
- Proxy Servers
- Firewalls
- Packet-Filtering Routers
In a Windows 2000 network there is an account that is created by default and allows users to log on to a workstation without a password. This account is called:
- Guest.
Outdated Web servers and third party applications are responsible for most of the risk associated with Web services.
a. true
b. false
- True
An intrusion detection system is considered an integral part of an incident response policy.
a. true
b. false
- True
What file systems will provide you the most security?
- NTFS
NTFS is the only Windows file system that provides security at the file level.
You have configured an access point in a small office and are concerned about hackers intruding on your wireless network. What settings will you adjust (from the manufacturer’s default settings) on the unit to address this potential problem? (Choose three.)
- WEP configuration
- Output power
- MAC Filtering
Compared to FAT 32, NTFS ____.
offers increased security
Dumpster diving refers to an attack method that utilizes which methods?
- Examining the company's trash
A good way to protect your system against software exploits is to install the latest security patches provided by your software vendors.
a. true
b. false
- True
Which file system would you use to support file encryption on Windows 2000?
- NTFS.
What is one security function of a firewall?
- Restricts unauthorized users from accessing sensitive data.
What sources could present a possible risk factor for virus infection on a PC? (Choose two)
- A downloaded file from the internet.
- A floppy disk received from a friend.
What insures messages cannot be intercepted or read by anyone other than their intended audience?
- Encryption.
In addition to passwords what can be used to authenticate the user? (Choose two)
- PINs
- Smart cards.
A small credit card sized device that you carry around with you in order to gain access to secure systems is referred to as a:
- Security token
What types of backups backs up all selected files if they have changed since the last back up, but does not mark them as having been backed up?
- Differential
Remember, when making backups onto any medium, it is important to backup regularly. Microsoft recognizes five types of backup strategies: Full backup: Copies all selected files to tape unconditionally. Incremental backup: Copies all files changed since the last full or incremental backup. Differential backup: Copies all files changed since the last full backup. Copy backup: Copies selected files to tape without resetting the archive bit Daily backup: Copies all files changed the day the backup is made.
Which of the following passwords provide the best security?
a. userTwo
b. user2
c. User$Two
d. password
- User$Two
Preventive maintenance of hardware means: (Choose two)
- Inspecting for physical damage
- Performing any scheduled maintenance
In order to satisfy mission critical timelines you come into work 4 hours early. You are in the office at 5:00 am ready to go but are unable to get on the network to access your files. What could be the problem?
- Your user account has time restrictions on it
A fellow employee that you were friendly with was terminated suddenly and without explanation. 6 months later he calls you and asks about who is still with the company. He tells you he's the Network Administrator for his new company and complains about how much trouble he has had with server updates and service packs. He asks if you had installed the updates. What is taking place here?
You are experiencing a social engineering attack
Which of the following are common security options that most wireless residential gateways include? (Choose all that apply.)
a. VPN Client or VPN Client Passthrough
b. Virtual Servers
c. PAT
d. Routing
e. PPPoE
- VPN Client or VPN Client Passthrough
- PAT
- PPPoE
- Virtual Servers
The Windows 2000 ____ feature, which can only be used with NTFS, uses a public key encryption scheme to encrypt files and folders.
- EFS
The Windows 2000/XP Encrypted File System incorporates public key encryption to enable users to create private files that can't be read be other users.
Any network that is connected to your organization and is not controlled by your organization represents a risk.
a. true
b. false
- True
Useful information that can be gathered by examining the company's waste material include which of the following?
a. calenders
b. used hard drives
c. all of these
d. policy manuals
e. organizational charts
- All of these
What choice provide the most secure means of wireless client authentication?
- WPA
The accuracy of biometric security systems is dependent in large part on the accuracy of the information maintained by the security department.
a. true
b. false
- True
Which statement describes the use of WEP with Open System authentication?
- The access point and client use the WEP key to encrypt the data only.
What would be considered malware? (Choose three)
- Spy ware
- Virus
- Trojan Horse
Which of the choices listed would be considered the strongest password?
a. Pa55w0rd
b. PaSsW0Rd
c. P^55w#r>
d. Pa$$word
- P^55w#r>
Windows 2000 ____ file system offers the greatest security.
- NTFS
Which Windows 2000 Professional utility can be used to identify unsuccessful logons?
- Local Security Policy
Virus programs are constantly being modified in order to escape detection. The best defense against the newly evolved viruses is to update your:
- Virus Definitions
What types of backups backs up all selected files and marks them as having been backed up only if they have been changed since the last back up?
- Incremental
Remember, when making backups onto any medium, it is important to backup regularly. Microsoft recognizes five types of backup strategies: Full backup: Copies all selected files to tape unconditionally. Incremental backup: Copies all files changed since the last full or incremental backup. Differential backup: Copies all files changed since the last full backup. Copy backup: Copies selected files to tape without resetting the archive bit Daily backup: Copies all files changed the day the backup is made.
You are the network administrator for a network with three servers and 50 clients and you have just installed a new anti virus package. You have been experiencing several disk crashes, what do you do to correct this?
- Install updates and patches.
You find the server room door ajar and propped open. Which of the following should you do?
- Close the door and report the incident to the system admin
Which security scenario is more restrictive to the user?
- User level access
Which backup method will clear the archive bit? (Select two)
- Full
- Incremental
Remember, it is important to know the types of backups and their capabilities. Know which schemes back up faster and which restore faster.
The Code Red Virus is an example of which virus type?
- Worm
In general terms which of the choices below would satisfy 2-Factor Authentication? (Choose two)
- Something you have in your possession
- Something you know
Biometric security systems are reasonable in cost, and easy to implement.
a. true
b. false
- False
Your company has a computer in a public access area. You need to change which of the following in the BIOS?
- Supervisor password
When designing a security policy, encryption and strong perimeter security are useless against social engineering attacks.
a. true
b. false
- True
The 802.11 standard specifies which of the following authentication processes? (Choose two.)
- Shared key authentication
- Open system authentication
A false positive results when an intrusion detection system grants network access to an individual who should be denied that access.
a. true
b. false
- True
Which security scenario is more restrictive?
- User level access.
What is the default location of the directory that Administrator user profile settings are stored in Windows 2000?
- C:\Documents and settings\Administrator.
What correctly identifies an open, global specification that is designed to deliver information and services to users of handheld digital wireless devices?
- WAP
Which of the devices listed is responsible for enforcing security policies that determine what traffic is allowed to enter or leave the network?
- Firewall
Your company’s SSL’s are not valid in Internet Explorer. What are your options to view the associated web pages successfully?
- Change your security settings`
What is a program or device that intercepts and reads each network packet called?
- Sniffer
It is less important to keep your username a secret than it is to keep your password a secret.
a. true
b. false
- False
What is true about a firewall? (Choose three)
- Block a hacker from accessing the network.
- Restrict a user from accessing an unauthorized site.
- Provide an alarm for unauthorized access attempts.
What is the best password policy to enhance security?
- Change passwords on a regular basis.
What correctly identifies the optional security mechanism that was specified by the 802.11 protocol in order to provide authentication and confidentiality in a wireless LAN environment?
- WEP
Which of the following should you have installed on a computer that will be connected to the home office network? Select all that apply.
a. Current Service packs
b. Malicious software remover
c. Disk Defrag
d. Antivirus
- Current Service packs
- Malicious software remover
- Antivirus
How can you improve password security?
Force a password change periodically`
The process of writing information to the security log is known as what?
- Logging
What is a secure password policy?
- Change passwords regularly.
Firewalls are used to:
a. protect the internet from attacks on the private side
b. protect the private networks from attacks on the public side
c. nether
d. both
- Both
What do you need to connect an 802.11 network that uses WEP?
- Password
- SSID