Johnny's MTA Security

98 Questions | Attempts: 204
Share

SettingsSettingsSettings
Johnny

.


Questions and Answers
  • 1. 

    Question No : 1 Which attack listens to network traffic of a computer resource?

    • A.

      Resource gathering

    • B.

      Denial of service

    • C.

      ARP poisoning

    • D.

      Eavesdropping

    • E.

      Logic bomb

    Correct Answer
    D. Eavesdropping
    Explanation
    Eavesdropping

    Rate this question:

  • 2. 

    Question No : 2 The default password length for a Windows Server domain controller is:

    • A.

      0

    • B.

      5

    • C.

      7

    • D.

      14

    Correct Answer
    C. 7
    Explanation
    7

    Rate this question:

  • 3. 

    Question No : 3 What does NAT do?

    • A.

      It encrypts and authenticates IP packets.

    • B.

      It provides caching and reduces network traffic.

    • C.

      It translates public IP addresses to private addresses and vice versa

    • D.

      It analyzes incoming and outgoing traffic packets.

    Correct Answer
    C. It translates public IP addresses to private addresses and vice versa
    Explanation
    It translates public IP addresses to private addresses and vice versa.

    Rate this question:

  • 4. 

    Question No : 4 Role separation improves server security by:

    • A.

      A. Enforcing principle of least privilege.

    • B.

      B. Installing applications on separate hard disks

    • C.

      C. Physically separating high security servers from other servers

    • D.

      D. Placing servers on separate VLANs

    Correct Answer
    A. A. Enforcing principle of least privilege.
  • 5. 

    Question No : 5 The Graphic Design Institute hires you to help them set up a server for their 20-person team. As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)

    • A.

      A. Disable the guest account.

    • B.

      B. Rename the admin account.

    • C.

      C. Remove the account lockout policy.

    • D.

      D. Format partitions with FAT32.

    Correct Answer(s)
    A. A. Disable the guest account.
    B. B. Rename the admin account.
    Explanation
    A. Disable the guest account. . Rename the admin account

    Rate this question:

  • 6. 

    Question No : 6 A network sniffer is software or hardware that:

    • A.

      A. Records user activity and transmits it to the server

    • B.

      B. Captures and analyzes network communication

    • C.

      C. Protects workstations from intrusions

    • D.

      D. Catalogs network data to create a secure index

    Correct Answer
    B. B. Captures and analyzes network communication
    Explanation
    Captures and analyzes network communication

    Rate this question:

  • 7. 

    Question No : 8 Your password is 1Vu*cI!8sT. Which attack method is your password vulnerable to?

    • A.

      A. Rainbow table

    • B.

      B. Brute force

    • C.

      C. Spidering

    • D.

      D. Dictionary

    Correct Answer
    A. A. Rainbow table
    Explanation
    Rainbow table

    Rate this question:

  • 8. 

    Question No : 9 A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A. What should you do first?

    • A.

      Disable folder sharing

    • B.

      Hide the folder

    • C.

      Change the owner

    • D.

      Block inheritance

    Correct Answer
    A. Disable folder sharing
    Explanation
    Disable folder sharing

    Rate this question:

  • 9. 

    Question No : 10 Many Internet sites that you visit require a user name and password. How should you secure these passwords?

    • A.

      Save them to a text file

    • B.

      Enable session caching

    • C.

      Configure the browser to save passwords

    • D.

      . Save them to an encrypted file

    • E.

      Reuse the same password

    Correct Answer
    D. . Save them to an encrypted file
    Explanation
    Save them to an encrypted file

    Rate this question:

  • 10. 

    Question No : 11 Bridging is a process of sending packets from source to destination on OSI layer 3. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

    • A.

      Routing

    • B.

      Switching

    • C.

      . Repeating

    • D.

      No change is needed.

    Correct Answer
    A. Routing
    Explanation
    Routing

    Rate this question:

  • 11. 

    Question No : 12 You need to install a domain controller in a branch office. You also need to secure the information on the domain controller. You will be unable to physically secure the server. Which should you implement?

    • A.

      Read-Only Domain Controller

    • B.

      Point-to-Point Tunneling Protocol (PPTP)

    • C.

      Layer 2 Tunneling Protocol (L2TP)

    • D.

      Server Core Domain Controller

    Correct Answer
    A. Read-Only Domain Controller
    Explanation
    Read-Only Domain Controller

    Rate this question:

  • 12. 

    Question No : 13 What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)

    • A.

      An image contained in the message

    • B.

      Spelling and grammar errors

    • C.

      . Threats of losing service

    • D.

      Use of bold and italics

    Correct Answer(s)
    B. Spelling and grammar errors
    C. . Threats of losing service
    Explanation
    Spelling and grammar errors , . Threats of losing service

    Rate this question:

  • 13. 

    Question No : 14 The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting it with the WPS PIN. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

    • A.

      Service Set Identifier (SSID)

    • B.

      Admin password

    • C.

      WEP key

    • D.

      No change is needed

    Correct Answer
    A. Service Set Identifier (SSID)
    Explanation
    Service Set Identifier (SSID)

    Rate this question:

  • 14. 

    Question No : 15 To implement WPA2 Enterprise, you would need a/an:

    • A.

      RADIUS server

    • B.

      SSL server

    • C.

      WEP server

    • D.

      VPN server

    Correct Answer
    A. RADIUS server
    Explanation
    RADIUS server

    Rate this question:

  • 15. 

    Question No : 16 You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

    • A.

      Disable unused services

    • B.

      Enable LM authentication

    • C.

      Enable NTLM authentication

    • D.

      No change is needed.

    Correct Answer
    A. Disable unused services
    Explanation
    Disable unused services

    Rate this question:

  • 16. 

    Question No : 17 Which two characteristics should you recommend for a user's domain password? (Choose two.)

    • A.

      Hard to guess

    • B.

      Includes Unicode characters

    • C.

      Easy to remember

    • D.

      Easy to increment

    Correct Answer(s)
    A. Hard to guess
    C. Easy to remember
    Explanation
    Hard to guess , Easy to remember

    Rate this question:

  • 17. 

    Question No : 18 What is a service set identifier (SSID)?

    • A.

      A wireless encryption standard

    • B.

      The wireless LAN transmission type

    • C.

      The broadcast name of an access point

    • D.

      A wireless security protocol

    Correct Answer
    C. The broadcast name of an access point
    Explanation
    The broadcast name of an access point

    Rate this question:

  • 18. 

    Question No : 20 Which is the minimum requirement to create BitLocker-To-Go media on a client computer?

    • A.

      Windows XP Professional Service Pack 3

    • B.

      Windows Vista Enterprise Edition

    • C.

      Windows 7 Enterprise Edition

    • D.

      Windows 2000 Professional Service Pack 4

    Correct Answer
    A. Windows XP Professional Service Pack 3
    Explanation
    Windows XP Professional Service Pack 3

    Rate this question:

  • 19. 

      Question No : 21 The Active Directory controls, enforces, and assigns security policies and access rights for all users. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

    • A.

      NTFS permissions

    • B.

      User Account Control

    • C.

      Registry

    • D.

      No change is needed

    Correct Answer
    D. No change is needed
    Explanation
    No change is needed

    Rate this question:

  • 20. 

    Question No : 22 Which two security settings can be controlled by using group policy? (Choose two.)

    • A.

      Password complexity

    • B.

      Access to the Run... command

    • C.

      Automatic file locking

    • D.

      Encrypted access from a smart phone

    Correct Answer(s)
    A. Password complexity
    B. Access to the Run... command
    Explanation
    Password complexity , Access to the Run... command

    Rate this question:

  • 21. 

    Question No : 23 Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one. Which server is best to use as a web server, considering the security and performance concerns?

    • A.

      SQL Server

    • B.

      File Server

    • C.

      Domain Controller

    • D.

      Application Server

    Correct Answer
    C. Domain Controller
    Explanation
    Domain Controller

    Rate this question:

  • 22. 

    Question No : 24 Cookies impact security by enabling: (Choose two.)

    • A.

      Storage of Web site passwords.

    • B.

      Higher security Web site protections.

    • C.

      Secure Sockets Layer (SSL).

    • D.

      Web sites to track browsing habits.

    Correct Answer(s)
    A. Storage of Web site passwords.
    D. Web sites to track browsing habits.
    Explanation
    Storage of Web site passwords., Web sites to track browsing habits.

    Rate this question:

  • 23. 

    Question No : 25 To protect systems from buffer overflow errors, you can use:

    • A.

      Antivirus software

    • B.

      Data Execution Prevention

    • C.

      A proxy server

    • D.

      An Intruder Prevention System

    Correct Answer
    B. Data Execution Prevention
    Explanation
    Data Execution Prevention

    Rate this question:

  • 24. 

    Question No : 26 Account lockout policies are used to prevent which type of security attack?

    • A.

      Brute force attacks

    • B.

      Users sharing passwords

    • C.

      Social engineering

    • D.

      Passwords being reused immediately

    Correct Answer
    A. Brute force attacks
    Explanation
    Brute force attacks

    Rate this question:

  • 25. 

    Question No : 29 A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

    • A.

      Malware

    • B.

      Spoofed mail

    • C.

      Spam

    • D.

      No change is needed.

    Correct Answer
    C. Spam
    Explanation
    Spam

    Rate this question:

  • 26. 

    Question No : 31 You want to make your computer resistant to online hackers and malicious software. What should you do?

    • A.

      Configure a forward proxy.

    • B.

      Install anti-virus software.

    • C.

      Enable spam filtering.

    • D.

      Turn on Windows Firewall.

    Correct Answer
    B. Install anti-virus software.
    Explanation
    Install anti-virus software.

    Rate this question:

  • 27. 

    Question No : 32 The certificate of a secure public Web server on the Internet should be:

    • A.

      Issued by a public certificate authority (CA)

    • B.

      Signed by using a 4096-bit key

    • C.

      Signed by using a 1024-bit key

    • D.

      Issued by an enterprise certificate authority (CA)

    Correct Answer
    A. Issued by a public certificate authority (CA)
    Explanation
    Issued by a public certificate authority (CA)

    Rate this question:

  • 28. 

    Question No : 33 The primary method of authentication in an SSL connection is passwords. To answer, choose the option "No change is needed" if the underlined text is correct. If the underlined text is not correct, choose the correct answer.

    • A.

      No change is needed

    • B.

      Certificates

    • C.

      IPsec

    • D.

      Biometrics

    Correct Answer
    B. Certificates
    Explanation
    Certificates

    Rate this question:

  • 29. 

    Question No : 35 What is a common method for password collection?

    • A.

      Email attachments

    • B.

      Back door intrusions

    • C.

      SQL Injection

    • D.

      Network sniffers

    Correct Answer
    D. Network sniffers
    Explanation
    Network sniffers

    Rate this question:

  • 30. 

    Question No : 39 A digitally signed e-mail message:

    • A.

      Validates the recipient

    • B.

      Validates the sender

    • C.

      Is encrypted

    • D.

      Is virus-free

    Correct Answer
    B. Validates the sender
    Explanation
    Validates the sender

    Rate this question:

  • 31. 

    Question No : 40 To keep third-party content providers from tracking your movements on the web, enable InPrivate Browsing. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

    • A.

      InPrivate Filtering

    • B.

      SmartScreen Filter

    • C.

      Compatibility Mode

    • D.

      No change is needed

    Correct Answer
    A. InPrivate Filtering
    Explanation
    InPrivate Filtering

    Rate this question:

  • 32. 

    Question No : 42 Keeping a server updated:

    • A.

      Maximizes network efficiency

    • B.

      Fixes security holes

    • C.

      Speeds up folder access

    • D.

      Synchronizes the server

    Correct Answer
    B. Fixes security holes
    Explanation
    Fixes security holes

    Rate this question:

  • 33. 

    Question No : 43 Humongous Insurance needs to set up a domain controller in a branch office. Unfortunately, the server cannot be sufficiently secured from access by employees in that office, so the company is installing a Primary Domain Controller. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

    • A.

      Read-Only Domain Controller

    • B.

      Backup Domain Controller

    • C.

      Active Directory Server

    • D.

      No change is needed.

    Correct Answer
    A. Read-Only Domain Controller
    Explanation
    Read-Only Domain Controller

    Rate this question:

  • 34. 

    Question No : 44 Phishing is an attempt to:

    • A.

      Obtain information by posing as a trustworthy entity

    • B.

      Limit access to e-mail systems by authorized users

    • C.

      Steal data through the use of network intrusion.

    • D.

      Corrupt e-mail databases through the use of viruses.

    Correct Answer
    A. Obtain information by posing as a trustworthy entity
    Explanation
    Obtain information by posing as a trustworthy entity

    Rate this question:

  • 35. 

    Question No : 46 What is an example of non-propagating malicious code?

    • A.

      A back door

    • B.

      A hoax

    • C.

      A Trojan horse

    • D.

      A worm

    Correct Answer
    A. A back door
    Explanation
    A back door

    Rate this question:

  • 36. 

    Question No : 47 You create a web server for your school. When users visit your site, they get a certificate error that says your site is not trusted. What should you do to fix this problem?

    • A.

      Install a certificate from a trusted Certificate Authority (CA).

    • B.

      Use a digital signature

    • C.

      Generate a certificate request.

    • D.

      Enable Public Keys on your website.

    Correct Answer
    A. Install a certificate from a trusted Certificate Authority (CA).
    Explanation
    Install a certificate from a trusted Certificate Authority (CA).

    Rate this question:

  • 37. 

    Question No : 49 Windows Server Update Services (WSUS) is a tool that:

    • A.

      Updates data stored in Windows servers

    • B.

      Manages the services that run on a server

    • C.

      Updates licensing for Windows servers

    • D.

      Manages updates for Microsoft software

    Correct Answer
    D. Manages updates for Microsoft software
    Explanation
    Manages updates for Microsoft software

    Rate this question:

  • 38. 

    Question No : 50 The purpose of Microsoft Baseline Security Analyzer is to:

    • A.

      List system vulnerabilities.

    • B.

      Apply all current patches to a server.

    • C.

      Set permissions to a default level

    • D.

      . Correct a company's security state.

    Correct Answer
    A. List system vulnerabilities.
    Explanation
    List system vulnerabilities

    Rate this question:

  • 39. 

    Question No : 52 In Internet Explorer 8, the InPrivate Browsing feature prevents:

    • A.

      Unauthorized private data input.

    • B.

      Unencrypted communication between the client computer and the server

    • C.

      User credentials from being sent over the Internet.

    • D.

      Any session data from being stored on the computer.

    Correct Answer
    D. Any session data from being stored on the computer.
    Explanation
    Any session data from being stored on the computer.

    Rate this question:

  • 40. 

    Question No : 53 Which enables you to change the permissions on a folder?

    • A.

      Take ownership

    • B.

      Extended attributes

    • C.

      Auditing

    • D.

      Modify

    Correct Answer
    D. Modify
    Explanation
    Modify

    Rate this question:

  • 41. 

    Question No : 54 To prevent users from copying data to removable media, you should:

    • A.

      Lock the computer cases

    • B.

      Apply a group policy

    • C.

      Disable copy and paste

    • D.

      Store media in a locked room

    Correct Answer
    B. Apply a group policy
    Explanation
    Apply a group policy

    Rate this question:

  • 42. 

    Question No : 55 Which technology enables you to filter communications between a program and the Internet?

    • A.

      RADIUS server

    • B.

      Antivirus software

    • C.

      Software firewall

    • D.

      BitLocker To Go

    Correct Answer
    C. Software firewall
    Explanation
    Software firewall

    Rate this question:

  • 43. 

    Question No : 56 This question requires that you evaluate the underlined text to determine if it is correct. The first line of defense against attacks from the Internet is a software firewall. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

    • A.

      Hardware firewall

    • B.

      Virus software

    • C.

      Radius server

    • D.

      No change is needed

    Correct Answer
    A. Hardware firewall
    Explanation
    hardware firewall

    Rate this question:

  • 44. 

    Question No : 58 Which type of firewall allows for inspection of all characteristics of a packet?

    • A.

      NAT

    • B.

      Stateful

    • C.

      Stateless

    • D.

      Windows Defender

    Correct Answer
    B. Stateful
    Explanation
    Stateful

    Rate this question:

  • 45. 

    Question No : 59 You suspect a user's computer is infected by a virus. What should you do first?

    • A.

      Restart the computer in safe mode

    • B.

      Replace the computer's hard disk drive

    • C.

      Disconnect the computer from the network

    • D.

      Install antivirus software on the computer

    Correct Answer
    D. Install antivirus software on the computer
    Explanation
    Install antivirus software on the computer

    Rate this question:

  • 46. 

    Question No : 60 You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen. What should you implement?

    • A.

      File-level permissions

    • B.

      Advanced Encryption Standard (AES)

    • C.

      Folder-level permissions

    • D.

      Distributed File System (DFS)

    • E.

      BitLocker

    Correct Answer
    E. BitLocker
    Explanation
    BitLocker

    Rate this question:

  • 47. 

    Question No : 61 Basic security questions used to reset a password are susceptible to:

    • A.

      Hashing

    • B.

      Social engineering

    • C.

      Network sniffing

    • D.

      Trojan horses

    Correct Answer
    B. Social engineering
    Explanation
    Social engineering

    Rate this question:

  • 48. 

    Question No : 63 Which is a special folder permission?

    • A.

      Read

    • B.

      Modify

    • C.

      Write

    • D.

      Delete

    Correct Answer
    D. Delete
    Explanation
    Delete

    Rate this question:

  • 49. 

    Question No : 64 Network Access Protection (NAP) enables administrators to control access to network resources based on a computer's:

    • A.

      Encryption level

    • B.

      Warranty

    • C.

      Physical location

    • D.

      Configuration

    Correct Answer
    D. Configuration
    Explanation
    Configuration

    Rate this question:

  • 50. 

    Question No : 65 A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

    • A.

      Decrease the chances of a virus getting to a client machine

    • B.

      Verify that the senders of the messages are legitimate

    • C.

      Ensure that all links in the messages are trustworthy

    • D.

      No change is needed.

    Correct Answer
    A. Decrease the chances of a virus getting to a client machine
    Explanation
    Decrease the chances of a virus getting to a client machine

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 19, 2018
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 16, 2018
    Quiz Created by
    Jlaster2218
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.