Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Unanswered Chapter 9

Unanswered Chapter 9



|Views: 8,652|Likes:
Published by mijoba6rn

More info:

Published by: mijoba6rn on Oct 11, 2009
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as TXT, PDF, TXT or read online from Scribd
See more
See less





1What is a good practice to prevent an unauthorized user from guessing a passwordand accessing an account?disabling account lockout status within the networkenabling a user account only after issuing a password to the user over thephonelocking out the account after a small, finite number of unsuccessfulattemptssetting the user account password to be left blank for the first login2Which two file system security features are applicable to the NTFS file system?(Choose two.)supports file and folder level encryptionsupported by all versions of Windows from, and including, Windows 95limited to 4 GB files size and a volume limit of 32 GBnumber of files in a volume limited to 4.17 million***includes journaling3What must be done to ensure that the anti-virus software on a computer is able todetect and eradicate the most recent viruses?***Download the latest signature files on a regular basis.Schedule a scan once a week.Schedule anti-virus updates using Windows Task Manager.Follow the firewall configuration guidelines on the anti-virus manufacturerwebsite.4Which statement accurately describes the WEP standard?***WEP is a first generation security standard for wireless communication.WEP is implemented using 16-bit encryption.WEP provides better encryption and authentication than WPA provides.WEP was created as a temporary solution until the implementation of 802.11i.5How can web tools, such as Java or ActiveX, be used for a malicious attack?by altering the interactivity level of a web pageby creating popup windowsby causing the web browser to crash, leaving the system vulnerable***by installing unwanted programs on a computer6The IT manager of a bank is disposing of some computers, but the hard drives havesome highly confidential data on them. What is the recommended way of dealing withthe drive to ensure that the data is irrecoverable?Delete all files and folders.Reformat the drive.Use a utility that overwrites all the data on the drive.***Break the drive platters with a hammer.7Which is the best procedure to secure a laptop left at the office while the useris away for an extended period of time?Secure by a security cable wrapped around the leg of the user's desk.Put the laptop in a desk drawer in the locked office of the user.***Place the laptop in a locked security cage designed to store computerequipment.
Place the laptop in the office of the supervisor.8Which two devices are used for the sole function of protecting computer equipmentfrom theft?***cable lockscard keyssecurity cages***smart cardsecurity key fob9Which best practice should be included in a password protection policy?Encourage users to document passwords in a personal file.Enforce password protection at either the BIOS level or the network loginlevel.***Passwords should contain a mixture of letters and numbers so that theycannot easily be broken.Restrict passwords to text-based strings.10Which three questions should be addressed by organizations developing a securitypolicy? (Choose three.)***What items need to be protected?How should the items be protected?***What is to be done in the case of a security breach?When do the items need protecting?What insurance coverage is required?***What are the possible threats to the items?11What happens when a wireless access point (WAP) is configured to stop broadcastingthe SSID?No new connections can be accepted by the wireless access point.The identity of the network is freely broadcast.The network is invisible to those who are unaware of the SSID.Signals are prevented from transmission outside the boundaries of the localnetwork.12What is accomplished by a successful DoS attack?It facilitates access to external networks.***It obstructs access to the specific target server.It obtains all addresses in the address book within the server.It stealthily scans the data on the target server.13What is typically included in a service pack?device drivers for nonstandard deviceshardware compatibility list***operating system upgrades and patchesvirus definitions14Which two technologies are used for authenticating users? (Choose two.)***biometricsEvent Viewersecure DNS

Activity (29)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Veton Shaqiri liked this
Nour Bush liked this
Nour Bush liked this
Zambilik liked this
Gishan Udara liked this
ngittens liked this
Lokita Ajach liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->