1

How can web tools, such as Java or ActiveX, be used for a malicious attack? by altering the interactivity level of a web page by creating popup windows by causing the web browser to crash, leaving the system vulnerable by installing unwanted programs on a computer

9.2.2 Explain web security 2 What does a malware detection program look for when running a scan? a service pack patterns in the programming code of the software on a computer patches that prevent a newly discovered virus or worm from making a successful attack mirror sites


3

9.4.1 Explain how to update signature files for anti-virus and anti-spyware software Which feature is characteristic of adware? It is a subset of spyware. It is a harmful virus that can corrupt the entire data on the network. It is displayed in popup windows, which open faster than the user can close them. It sends out sensitive information to the attacker.


4

9.2.3 Define adware, spyware, and grayware Which form of network protection is used as the basis of VPN? data backup data encryption firewall protection port protection


5

9.3.3 Describe ways to protect data The IT manager of a bank is disposing of some computers, but the hard drives have some highly confidential data on them. What is the recommended way of dealing with the drive to ensure that the data is irrecoverable? Delete all files and folders. Reformat the drive. Use a utility that overwrites all the data on the drive.

Break the drive platters with a hammer.


6

9.2.8 Explain hardware deconstruction and recycling An attacker sends a large number of requests to a server from several computers that are located at different geographical locations. What is the name for this type of attack? DDoS DoS e-mail bomb ping of death


7

9.2.4 Explain Denial of Service Which two file system security features are applicable to the NTFS file system? (Choose two.) supports file and folder level encryption supported by all versions of Windows from, and including, Windows 95 limited to 4 GB files size and a volume limit of 32 GB number of files in a volume limited to 4.17 million includes journaling


8

9.3.3 Describe ways to protect data What is typically included in a service pack? device drivers for nonstandard devices hardware compatibility list operating system upgrades and patches virus definitions


9

9.4.2 Explain how to install operating systems service packs and security patches What is a good practice to prevent an unauthorized user from guessing a password and accessing an account? disabling account lockout status within the network enabling a user account only after issuing a password to the user over the phone locking out the account after a small, finite number of unsuccessful attempts setting the user account password to be left blank for the first login


10

9.3.3 Describe ways to protect data What is accomplished by a successful DoS attack? It facilitates access to external networks. It obstructs access to the specific target server. It obtains all addresses in the address book within the server. It stealthily scans the data on the target server.


11

9.2.7 Explain TCP/IP attacks Which statement accurately describes the WEP standard? WEP is a first generation security standard for wireless communication. WEP is implemented using 16-bit encryption. WEP provides better encryption and authentication than WPA provides. WEP was created as a temporary solution until the implementation of 802.11i.


12

9.3.4 Describe wireless security techniques What happens when a wireless access point (WAP) is configured to stop broadcasting the SSID? No new connections can be accepted by the wireless access point. The identity of the network is freely broadcast. The network is invisible to those who are unaware of the SSID. Signals are prevented from transmission outside the boundaries of the local network.

• •
13

9.3.4 Describe wireless security techniques

16.3.1 Configure security settings Which two technologies are used for authenticating users? (Choose two.) biometrics Event Viewer secure DNS smart card UNC


14

9.3.2 Explain the tasks required to protect physical equipment Which two devices are used for the sole function of protecting computer equipment from theft?

cable locks card keys security cages smart card security key fob


15

9.3.2 Explain the tasks required to protect physical equipment Which two actions can be considered social engineering attacks? (Choose two.) analyzing the products of a competitor company obtaining the directory of a competitor company that contains the e-mail addresses of all the employees of that company researching reviews and other articles about the performance of a competitor company researching the website of a competitor company searching for important documents on the desks of a competing company

16

Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time? Secure by a security cable wrapped around the leg of the user's desk. Put the laptop in a desk drawer in the locked office of the user. Place the laptop in a locked security cage designed to store computer equipment. Place the laptop in the office of the supervisor.


17

9.3.2 Explain the tasks required to protect physical equipment What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses? Download the latest signature files on a regular basis. Schedule a scan once a week. Schedule anti-virus updates using Windows Task Manager. Follow the firewall configuration guidelines on the anti-virus manufacturer website.

18

Which three questions should be addressed by organizations developing a security policy? (Choose three.) What items need to be protected? How should the items be protected? What is to be done in the case of a security breach? When do the items need protecting? What insurance coverage is required? What are the possible threats to the items?


19

9.3.1 Explain what is required in a basic local security policy A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? Create a restore point. Backup all the install disks. Update the antivirus software. Change the firewall rules to enable the installer to access port 8900 of the Microsoft server.


20

9.4.2 Explain how to install operating systems service packs and security patches Which best practice should be included in a password protection policy? Encourage users to document passwords in a personal file. Enforce password protection at either the BIOS level or the network login level. Passwords should contain a mixture of letters and numbers so that they cannot easily be broken. Restrict passwords to text-based strings.

1

A fingerprint reader is an example of which security technology? authorization biometric keylogging secureware smartcard


2

9.3.2 Explain the tasks required to protect physical equipment Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux? LEAP

WEP WPA WTLS


3

9.3.4 Describe wireless security techniques Which type of program causes banners and ads to appear on the desktop without any user intervention? adware spyware stealth virus trojan horse


4

9.2.3 Define adware, spyware, and grayware What are two examples of malware? (Choose two.) registry cleaner pop-up blocker spyware e-mail grayware

5

Which two characteristics describe a worm? (Choose two.) Executes when software is run on a computer. Is self-replicating. Hides in a dormant state until needed by an attacker. Infects computers by attaching to software code. Travels to new computers without any intervention or knowledge of the user.


6

9.2.1 Define viruses, worms, and Trojans An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat? man-in-the-middle phishing physical social engineering spoofing


7

9.2.6 Explain social engineering Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time? Secure by a security cable wrapped around the leg of the user's desk. Put the laptop in a desk drawer in the locked office of the user. Place the laptop in a locked security cage designed to store computer equipment. Place the laptop in the office of the supervisor.


8

9.3.2 Explain the tasks required to protect physical equipment Where is the safest place to store backups? portable lock box locked telecommunications room locked server room offsite secure facility


9

9.3.3 Describe ways to protect data What is the best method for a company to secure data being transmitted across the Internet between remote sites? Use plain text in an e-mail. Use a shared server with an encrypted password on the file. Use computers secured with smartcard authentication. Use a VPN connection.


10

9.3.3 Describe ways to protect data Which threat to security uses traffic from zombie computers to overwhelm servers? DoS DDoS phishing spoofing SYN flood


11

9.2.4 Explain Denial of Service Which two statements are true about username and password standards? (Choose two.) The username naming convention should be kept simple. Usernames should expire periodically. The passwords should be kept simple and easy to remember. Rules about password expiration and lockout should be defined. BIOS passwords should be given to users to enable them to configure their computer.


12

9.3.3 Describe ways to protect data When setting up a new wireless access point, which basic security measure should be taken? Disable SSID broadcast. Enable SSID broadcast. Broadcast the default SSID. Broadcast a unique SSID.


13

9.3.4 Describe wireless security techniques What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses? Download the latest signature files on a regular basis. Schedule a scan once a week. Schedule anti-virus updates using Windows Task Manager. Follow the firewall configuration guidelines on the anti-virus manufacturer website.


14

9.4.1 Explain how to update signature files for anti-virus and anti-spyware software Which two items can be downloaded from the Microsoft website to help protect Windows XP? (Choose two.) ROM upgrades service packs security patches BIOS upgrades DirectX updates


15

9.4.2 Explain how to install operating systems service packs and security patches What is the difference between WEP64 and WEP128? WEP64 can handle 64 simultaneous connections, and WEP128 can handle 128 simultaneous connections. WEP64 operates on a 64-bit processor, but WEP128 requires a dual core 128-bit processor. WEP64 uses 64-byte packets, and WEP128 uses 128-byte packets. WEP64 uses a 64-bit encryption key, and WEP128 uses a 128-bit key.


16

9.3.4 Describe wireless security techniques A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data? Delete the files containing the confidential data. Reformat the hard drives. Expose the hard drives to ultraviolet light. Destroy the hard drives with a hammer.


17

9.2.8 Explain hardware deconstruction and recycling A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? Create a restore point. Manually update the Last Known Good Configuration. Reinstall the anti-virus software. Change the firewall rules to enable the installer to access port 8900 of the Microsoft server.


18

9.4.2 Explain how to install operating systems service packs and security patches Which best practice should be included in a password protection policy? Encourage users to document passwords in a personal file. Enforce password protection at the BIOS level. Implement lockout rules upon consecutive unsuccessful attempts at accessing the system. Restrict passwords to text-based strings.


19

9.3.3 Describe ways to protect data An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented?

adware phishing spyware trojan


20

9.2.3 Define adware, spyware, and grayware Which type of software is downloaded onto the computer of a user without the knowledge of the user and causes information about various products to be displayed on the user's monitor? adware free software grayware spyware

9.2.3 Define adware, spyware, and grayware

1

Which functionality is normally expected from adware? It is installed on the computer by the user. It is usually distributed with downloaded software. It monitors activity on the computer and sends this information to the organization that launched it. It prevents opening of extra windows on the computer without the consent of the user.


2

9.2.3 Define adware, spyware, and grayware A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deploy? denial of service ping of death replay SYN flood

9.2.7 Explain TCP/IP attacks 3 An attacker has managed to decode the encrypted messages of a wireless network. The network uses Windows XP and Cisco equipment. The security protocol that is used is WEP with 64-bit encryption. Which action can be recommended to the technician for securing the network?

Advise users to store their network authentication data, such as their passwords, in a secure manner. Configure Windows update to run automatically, at a convenient time and on a regular basis. Recover all sensitive data from the computers of the network, destroy their hard drives, and recycle the computers. Upgrade to the LEAP wireless security protocol.

4

9.3.4 Describe wireless security techniques Which task is in the scope of responsibilities of a network technician working with security updates and patches? submit a schedule to the manufacturer of when updates should be available developing patches and updates author signature files installing patches and updates

5

9.4 Identify common preventive maintenance techniques for security Which procedure would be a valid password lockout rule? An account should be locked out after a specific number of unsuccessful login attempts. A password should be locked from public view. An account should be locked out after a random period of time. A password should lock out a user from connecting to external networks

6

9.3.3 Describe ways to protect data An employee of a bank asked the network administrator for advice about an e-mail that the employee had received. The e-mail asked for the employee's username and password details to confirm the employee's identity in order to update details in a database. The network administrator told the employee not to respond. Which type of security attack was the network administrator worried about? adware attack DDoS attack phishing attack virus attack

9.2.3 Define adware, spyware, and grayware 7 Which attack can be accomplished by using phishing techniques? DDoS attack e-mail bomb attack ping-of-death attack

social engineering attack

9.2.3 Define adware, spyware, and grayware 8 Which two practices help prevent unauthorized access to a wireless network? (Choose two.) disabling the broadcast of SSID installing the WAP protocol filtering the MAC addresses of computers retaining the original firmware on all wireless devices using 64-bit encryption as per the WEP standard

9.3.4 Describe wireless security techniques 9 What is the name given to code patterns of viruses? grayware mirrors signatures virus definition tables

10

9.4.1 Explain how to update signature files for anti-virus and anti-spyware software When accessing a website, a user is overwhelmed by popup windows that open faster than the user can close them. What is the most likely cause of this problem? adware phishing spyware Trojan

11

9.2.3 Define adware, spyware, and grayware Which security device stores user physical characteristics to provide a user level of facility access? a biometric sensor a card key a key fob a smart card

12

9.3.2 Explain the tasks required to protect physical equipment Which two procedures can help secure data backups? (Choose two.) Only perform full backups. Keep backup media off site. Ensure that the responsibility for conducting backups is frequently changed among users. Place a password on the backup. Do the backup at the same time each day.

9.3.3 Describe ways to protect data 13 A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown? Notification for downloading available updates will be displayed when the computer is rebooted. The update will be lost. The update for the computer will be queued on the website. The update will be installed as soon as the computer is powered on.


14

9.4.2 Explain how to install operating systems service packs and security patches A company uses computers and wireless access points from a variety of different suppliers. Which wireless security protocol should the company use to achieve the best level of security? LEAP WEP WPA WTLS


15

9.3.4 Describe wireless security techniques Which precaution helps protect against social engineering in the workplace? disclosing passwords to company personnel only guiding visitors within the premises and escorting them personally when they leave keeping hidden from public view any passwords that are posted in the work area sharing access cards with other employees


16

9.2.6 Explain social engineering In which type of attack are TCP ports randomly opened to overload the network with a large number of false requests? e-mail bomb attack replay attack spoofing attack SYN flood attack


17

9.2.7 Explain TCP/IP attacks Which feature of WPA makes it suitable for configuring wireless security? It disables SSID broadcasting, which prevents unauthorized users from accessing the network. It encrypts the data that is broadcast between the wireless access point and the wireless clients. It restricts computer access to a wireless access point. It transmits signals only within the network area.


18

9.3.4 Describe wireless security techniques A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which name is given to this type of e-mail? spoof adware grayware spam


19

9.2.5 Describe spam and popup windows What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses? Download the latest signature files on a regular basis. Schedule a scan once a week. Schedule anti-virus updates using Windows Task Manager. Follow the firewall configuration guidelines on the anti-virus manufacturer website.

9.4.1 Explain how to update signature files for anti-virus and anti-spyware software

20

Which two actions improve security on a wireless network? (Choose two.) Enable WEP. Broadcast the default SSID. Keep the default administrator password for the access point. Enable MAC filtering.

1.

9.3.4 Describe wireless security techniques

Sign up to vote on this title
UsefulNot useful