.
Resource gathering
Denial of service
ARP poisoning
Eavesdropping
Logic bomb
Rate this question:
0
5
7
14
Rate this question:
It encrypts and authenticates IP packets.
It provides caching and reduces network traffic.
It translates public IP addresses to private addresses and vice versa
It analyzes incoming and outgoing traffic packets.
Rate this question:
A. Enforcing principle of least privilege.
B. Installing applications on separate hard disks
C. Physically separating high security servers from other servers
D. Placing servers on separate VLANs
A. Disable the guest account.
B. Rename the admin account.
C. Remove the account lockout policy.
D. Format partitions with FAT32.
Rate this question:
A. Records user activity and transmits it to the server
B. Captures and analyzes network communication
C. Protects workstations from intrusions
D. Catalogs network data to create a secure index
Rate this question:
A. Rainbow table
B. Brute force
C. Spidering
D. Dictionary
Rate this question:
Disable folder sharing
Hide the folder
Change the owner
Block inheritance
Rate this question:
Save them to a text file
Enable session caching
Configure the browser to save passwords
. Save them to an encrypted file
Reuse the same password
Rate this question:
Routing
Switching
. Repeating
No change is needed.
Rate this question:
Read-Only Domain Controller
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Server Core Domain Controller
Rate this question:
An image contained in the message
Spelling and grammar errors
. Threats of losing service
Use of bold and italics
Rate this question:
Service Set Identifier (SSID)
Admin password
WEP key
No change is needed
Rate this question:
RADIUS server
SSL server
WEP server
VPN server
Rate this question:
Disable unused services
Enable LM authentication
Enable NTLM authentication
No change is needed.
Rate this question:
Hard to guess
Includes Unicode characters
Easy to remember
Easy to increment
Rate this question:
A wireless encryption standard
The wireless LAN transmission type
The broadcast name of an access point
A wireless security protocol
Rate this question:
Windows XP Professional Service Pack 3
Windows Vista Enterprise Edition
Windows 7 Enterprise Edition
Windows 2000 Professional Service Pack 4
Rate this question:
NTFS permissions
User Account Control
Registry
No change is needed
Rate this question:
Password complexity
Access to the Run... command
Automatic file locking
Encrypted access from a smart phone
Rate this question:
SQL Server
File Server
Domain Controller
Application Server
Rate this question:
Storage of Web site passwords.
Higher security Web site protections.
Secure Sockets Layer (SSL).
Web sites to track browsing habits.
Rate this question:
Antivirus software
Data Execution Prevention
A proxy server
An Intruder Prevention System
Rate this question:
Brute force attacks
Users sharing passwords
Social engineering
Passwords being reused immediately
Rate this question:
Malware
Spoofed mail
Spam
No change is needed.
Rate this question:
Configure a forward proxy.
Install anti-virus software.
Enable spam filtering.
Turn on Windows Firewall.
Rate this question:
Issued by a public certificate authority (CA)
Signed by using a 4096-bit key
Signed by using a 1024-bit key
Issued by an enterprise certificate authority (CA)
Rate this question:
No change is needed
Certificates
IPsec
Biometrics
Rate this question:
Email attachments
Back door intrusions
SQL Injection
Network sniffers
Rate this question:
Validates the recipient
Validates the sender
Is encrypted
Is virus-free
Rate this question:
InPrivate Filtering
SmartScreen Filter
Compatibility Mode
No change is needed
Rate this question:
Maximizes network efficiency
Fixes security holes
Speeds up folder access
Synchronizes the server
Rate this question:
Read-Only Domain Controller
Backup Domain Controller
Active Directory Server
No change is needed.
Rate this question:
Obtain information by posing as a trustworthy entity
Limit access to e-mail systems by authorized users
Steal data through the use of network intrusion.
Corrupt e-mail databases through the use of viruses.
Rate this question:
A back door
A hoax
A Trojan horse
A worm
Rate this question:
Install a certificate from a trusted Certificate Authority (CA).
Use a digital signature
Generate a certificate request.
Enable Public Keys on your website.
Rate this question:
Updates data stored in Windows servers
Manages the services that run on a server
Updates licensing for Windows servers
Manages updates for Microsoft software
Rate this question:
List system vulnerabilities.
Apply all current patches to a server.
Set permissions to a default level
. Correct a company's security state.
Rate this question:
Unauthorized private data input.
Unencrypted communication between the client computer and the server
User credentials from being sent over the Internet.
Any session data from being stored on the computer.
Rate this question:
Take ownership
Extended attributes
Auditing
Modify
Rate this question:
Lock the computer cases
Apply a group policy
Disable copy and paste
Store media in a locked room
Rate this question:
RADIUS server
Antivirus software
Software firewall
BitLocker To Go
Rate this question:
Hardware firewall
Virus software
Radius server
No change is needed
Rate this question:
NAT
Stateful
Stateless
Windows Defender
Rate this question:
Restart the computer in safe mode
Replace the computer's hard disk drive
Disconnect the computer from the network
Install antivirus software on the computer
Rate this question:
File-level permissions
Advanced Encryption Standard (AES)
Folder-level permissions
Distributed File System (DFS)
BitLocker
Rate this question:
Hashing
Social engineering
Network sniffing
Trojan horses
Rate this question:
Read
Modify
Write
Delete
Rate this question:
Encryption level
Warranty
Physical location
Configuration
Rate this question:
Decrease the chances of a virus getting to a client machine
Verify that the senders of the messages are legitimate
Ensure that all links in the messages are trustworthy
No change is needed.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.