Q1. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Which of the following actions will Mark take to configure Internet zone feature in IE 8 and to enable users to easily browse the local intranet without disturbing the security levels?
A. Develop a social awareness of security threats within an organization.
B. Call a team member while behaving to be someone else for gaining access to sensitive information.
C. Provide protection against a Distributed Denial of Services attack.
D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site.
Answer: D
Q2. Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network uses Network Access Protection (NAP). The company's employees at the remote locations are connecting to the company's network from their Windows Vista clients. Mark wants to ensure that the data transmission between a client computer and the company's network is as secure as possible. What will Mark do to accomplish the task?
A. Use Encrypting File System (Efs) between the client computer and the company's network.
B. Use IPSec NAP policy between client computer and the company's network.
C. Use VPN connection with MS-CHAP v2 between the client computer and the company's network.
D. Use NAP enforcement for DHCP.
Answer: B
Q3. Which of the following is a technique used to attack an Ethernet wired or wireless network?
A. ARP poisoning
B. DNS poisoning
C. Mail bombing
D. Keystroke logging
Answer: A
Q4. Which of following is required to be configured to ensure that the Bitlocker storage can be reclaimed?
A. BitLocker to use data recovery agents
B. BitLocker to use the password screen saver
C. BitLocker to use the Secret Retrieval Agent
D. BitLocker to use the Artificial Intelligence recovery option.
Answer: A
Q5. John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation? Each correct answer represents a complete solution. Choose all that apply.
A. He should restore his Windows settings.
B. He should upgrade his antivirus program.
C. He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.
D. He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.
Answer: BC
Q6. In which of the following is the file audit events are written when auditing is enabled?
A. File system ACL
B. Biometric device
C. Network Access Control List
D. Security event log
Answer: D
Q7. Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?
A. Security
B. Certificate
C. Cookies
D. Proxy server
Answer: A
Q8. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Mark asked his team to be assured that they are on a secured website. What they will do?
A. Take a look for a padlock in the lower right corner of the browser and https:// in the address bar.
B. Provide protection against a Distributed Denial of Services attack.
C. Call a team member while behaving to be someone else for gaining access to sensitive information.
D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site.
Answer: A
Q9. You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?
A. Network Based
B. Host based
C. Dictionary
D. Heuristic
Answer: D
Q10. Which of the following is the edge between the private and locally managed-and-owned side of a network and the public side that is commonly managed by a service provider?
A. Internet
B. Network perimeter
C. Intranet
D. VLAN
Answer: B
Q11. Which of the following is more secure protocol between Point to Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP)?
A. PPTP and L2TP, both of them define the same security standard.
B. PPTP is more secure than L2TP.
C. PPTP and L2TP , both of them are used to provide the database connection.
D. L2TP is more secure than PPTP.
Answer: D
Q12. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company had a many outbreaks of viruses on the network that are propagated via email. Mark wants to educate his team about malicious software and email. Which of the following will he suggest his team members to do when a suspicious email that contains an embedded hyperlink is received from a customer?
A. To delete the email and then contact Mark and the customer.
B. To forward the email to other team members for warning them that the email is not legitimate.
C. To click the hyperlink for checking the result.
D. To resend the email to the customer from which it seems to be sent.
Answer: A
Q13. Which of the following works at the network layer and hides the local area network IP address and topology?
A. Network address translation (NAT)
B. MAC address
C. Hub
D. Network interface card (NIC)
Answer: A
Q14. Which of the following is the reason of properly securing an audit log?
A. To ensure that only authorized person can check the log file.
B. To ensure that no one can remove it as there is no back up is provided for this log.
C. To ensure that potential hackers becomes unable to delete the event logs for covering their tracks.
D. To ensure that potential hackers can be tracked easily without changing the network configuration.
Answer: C
Q15. You have configured a virtualized Internet browser on your Windows XP professional computer. Using the virtualized Internet browser, you can protect your operating system from which of the following?
A. Brute force attack
B. Distributed denial of service (DDOS) attack
C. Mail bombing
D. Malware installation from unknown Web sites
Answer: D
Q16. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company.
In which of the following ways can Mark add another level of security after implanting encryption techniques for the business wireless traffic? Each correct answer represents a complete solution. Choose all that apply.
A. Hide the Service Set Identifier (SSID)
B. Configure the network to use only Extensible Authentication Protocol (EAP)
C. Implement access point isolation and
D. Use MAC filtering
Answer: AC