Q1. Which of the following is a process in which data is changed before or while it is entered into a computer system? A. Data diddling B. Authentication C. Domain kiting D. Packet sniffing View AnswerAnswer: A Q2. You want to standardize security throughout your network. You primarily use Microsoft operating systems for servers and workstations. What is the best way to have standardized security (i.e.…
Q1. Which of the following is the process of keeping track of a user's activity while accessing network resources? A. Authentication B. Auditing C. Spoofing D. Biometrics View AnswerAnswer: B Q2. Which of the following are the Internet Explorer security zones? Each correct answer represents a complete solution. Choose three. A. Trusted sites B. Internet C. Local intranet D. Extranet View AnswerAnswer: ABC Q3. Which of the following are the types of…
Q1. Which of the following is a broadcast domain created by a switch? A. VLAN B. MAN C. DMZ D. VPN View AnswerAnswer: A Q2. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement a method to ensure that the mobile devices are in a good state of security health when they are trying to access…
Q1. Which of the following is a method of capturing and recording computer users' keystrokes including sensitive passwords? A. Using hardware keyloggers B. Using Alchemy Remote Executor C. Using SocketShield D. Using Anti-virus software View AnswerAnswer: A Q2. Which of the following is a mechanism that allows authentication of dial-in and other network connections? A. VPN B. NTFS C. RADIUS D. Single Sign-On View AnswerAnswer: C Q3. Which of the following is…
Q1. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that…
Q1. Which of the following is an authentication protocol? A. Kerberos B. LDAP C. TLS D. PPTP View AnswerAnswer: A Q2. Mark works as a Systems Administrator for TechMart Incl. The company has Windows-based network. Mark has been assigned a project to track who tries to log into the system and the time of the day at which the attempts occur. He is also required to…
Q1. Which of the following is a attack type that is used to poison a network or computer to the point where the system is turned into unusable state? A. Mail bombing B. Pharming C. Protocol spoofing D. Denial of service (DOS) View AnswerAnswer: D Q2. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit…
Q1. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within…
Q1. Which of the following can be implemented to ensure that the computers are using latest security updates?A. HardeningB. Windows Software Update ServicesC. Microsoft Baseline Security AnalyzerD. Domain Name SystemView AnswerAnswer: BQ2. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system? A. PIN B. Private key C. Key escrow D.…
Q1. Which of the following security zones is used for Web sites that the user does not trust? A. Internet zone B. Trusted zone C. Restricted zone D. Local Intranet zone View AnswerAnswer: C Q2. Which of the following can be implemented to decrease the number of times a user is required to be authenticated for access a particular resource? A. TCP/IP protocol B. Network Directory Access Protocol C.…
Q1. You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872). All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic? A. Perform a virus scan to find the virus responsible for this traffic. B. Check the exceptions in the firewall and unselect…
Q1. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system? A. Key escrowB. Public key C. Private key D. PIN View AnswerAnswer: D Q2. You work as a network administrator for an insurance company called InZed Inc. The company has developed a corporate policy that requires all machines to use the…