Nový Objekt - Textový Dokument

  • Uploaded by: Danka
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Nový Objekt - Textový Dokument as PDF for free.

More details

  • Words: 2,634
  • Pages: 11
Which feature must be enabled to monitor network activity within Windows XP? hash encoding logging and auditing password protection symmetric encryption Scoring Rule For: correctness of response 2 points for Option 2 Pipo16 (15:27:16 8/06/2009) Which security technique provides secure tunnels? asymmetric encryption hash encoding symmetric encryption VPN Scoring Rule For: correctness of response 2 points for Option 4 Pipo16 (15:27:27 8/06/2009) After analyzing and researching the problem by visiting several technical websites, a technician was unable to help a user to log in. Later, the user rebooted the computer and was able to log in. Which step did the technician omit during the troubleshooting process? closing the issue with the customer gathering data from the computer gathering information from the user trying quick solutions Scoring Rule For: correctness of response 2 points for Option 4 Pipo16 (15:27:37 8/06/2009) After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of networkrelated problems? (Choose two.) paperwork that is provided to customers the manufacturer FAQ for network devices

firewall logs network device logs technical websites Scoring Rule For: correctness of response Option 2 and Option 5 are correct. 1 point for each correct option. Pipo16 (15:27:47 8/06/2009) Why is the Notify me Windows update option more suitable for dial-up connections? It allows the user to control the update to prevent interruption of other network activity. It automatically downloads updates and notifies the user to install them later. It automatically installs updates when the user is not working on the computer. It prevents checking for updates. Scoring Rule For: correctness of response 2 points for Option 1 Pipo16 (15:27:56 8/06/2009) Which action provides superior protection for a wireless network? configuring WEP with 32-bit encryption configuring WPA disabling MAC address filtering retaining the default SSID Scoring Rule For: correctness of response 2 points for Option 2 Pipo16 (15:28:06 8/06/2009) Which encryption technology uses the SHA and MD5 algorithms? asymmetric encryption hash encoding symmetric encryption VPN Scoring Rule For: correctness of response 2 points for Option 2 Pipo16 (15:28:17 8/06/2009) Which software application monitors and reports the changes in program code? an application that protects the computer from adware a patch to an application a firewall application IDS Scoring Rule For: correctness of response 2 points for Option 4 Pipo16 (15:28:27 8/06/2009) While gathering data to troubleshoot a problem with a computer, the technician asked various questions. Which question is a closed-ended question? Has the password been changed recently?

When did the problem start? What type of firewall is being used? What types of backups were used to back up the data on the computer over the last month? Scoring Rule For: correctness of response 2 points for Option 1 Pipo16 (15:28:35 8/06/2009) Which backup method will always ensure that all data could be restored from a single backup? daily backup differential backup incremental backup full backup Scoring Rule For: correctness of response 2 points for Option 4 Pipo16 (15:28:44 8/06/2009) A vendor needs to work in the company office for two weeks. Which type of account should be created for the vendor? a guest account along with partial access to the network a new account that gives the same privileges as company employees have a re-enabled account of a former employee a temporary account along with full access to the network Scoring Rule For: correctness of response 2 points for Option 1 Pipo16 (15:28:56 8/06/2009) When Windows Update is being configured on a computer with Windows XP, which option can conflict with the security policy of an organization? Automatic updates Download updates Notify me Turn off automatic updates Scoring Rule For: correctness of response 2 points for Option 1 Pipo16 (15:29:05 8/06/2009) What is a feature of restrictive firewall security policy? It enables a specific list of ports, and only packets entering through those ports are permitted. It restricts the running of software to administrator accounts. It limits the number of users who can access the network. It permits access through all ports except those that are explicitly denied. Scoring Rule For: correctness of response 2 points for Option 1 Pipo16 (15:29:15 8/06/2009)

A network administrator disabled SSID transmission in a wireless network that is equipped with WPA. However, an attacker managed to penetrate the network. The administrator then deployed a wireless security configuration tool to restrict access to listed clients. Which tool did the network administrator install? MAC address filtering WEP wireless antenna packet filtering Scoring Rule For: correctness of response 2 points for Option 1 Pipo16 (15:29:55 8/06/2009) Which security element operates independently of computer resources? antispyware program antivirus program hardware firewall software firewall Scoring Rule For: correctness of response 2 points for Option 3 Pipo16 (15:30:03 8/06/2009) Which solution, when deployed on a network, looks for policy matches via the use of IP addresses and port numbers? dual-homed gateway packet filter firewall proxy firewall stateful inspection firewall Scoring Rule For: correctness of response 2 points for Option 2 Pipo16 (15:30:10 8/06/2009) Which security device communicates with the computer over a short range? biometric device conduit security key fob smart card Scoring Rule For: correctness of response 2 points for Option 3 Pipo16 (15:30:18 8/06/2009) Which device is used to ensure secure credit card payments? card key conduit security key fob smart card Scoring Rule For: correctness of response 2 points for Option 4

Pipo16 (15:30:56 8/06/2009) What is the purpose of using hash encoding? to ensure complete security of the message digest to ensure that the data remains the same even if the message digest is tampered with to ensure that tampering with data is detectable to regenerate the message digest when the original message digest is changed Scoring Rule For: correctness of response 2 points for Option 3 martinez (15:32): jeej Pipo15 (15:32): What is the purpose of using hash encoding? to ensure complete security of the message digest to ensure that the data remains the same even if the message digest is tampered with to ensure that tampering with data is detectable to regenerate the message digest when the original message digest is changed Scoring Rule For: correctness of response 2 points for Option 3 asi vsetkych 20

Which feature is characteristic of a guest account? It always remains active. It can be configured to grant extensive access to resources on a temporary basis. It disables access to the Internet, e-mail, and any printer. It must be specifically configured for each guest. 2 What is a disadvantage of configuring a firewall using permissive settings? Devices are exposed to attack. Packet transmission becomes complicated, requiring explicit access permission for all packets. The extra ports that are used by various applications are closed. The settings may cause a user to be locked out of the system. 3 Which method of filtering traffic is used to monitor established network connections to allow only packets from established network connections? packet filter proxy firewall stateful packet inspection wireless NICs 4 Which Windows XP command performs a data backup? BACKUP BUP

NTBACKUP XPBACKUP 5 A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician? EXT FAT FAT32 NTFS 6 Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges? smart card security key fob storage area network biometric device 7 Which right can only be granted by enabling the Full Control file-level permission? change the permissions of a file delete a file overwrite a file run a file 8 Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.) It costs less because it is more efficient. It does not impact the processing performance of the equipment it protects. It always protects both the computer it is installed on as well as the rest of the network. It is designed to protect more than one computer. It is a free Windows operating system component. 9 What is the default setting for Windows XP operating system updates? automatic only download updates notify me manual 10 After analyzing and researching the problem by visiting several technical websites, a technician was unable to help a user to log in. Later, the user rebooted the computer and was able to log in. Which step did the technician omit during the troubleshooting process? closing the issue with the customer gathering data from the computer gathering information from the user trying quick solutions 11 Which characteristic of an application is used by the Windows XP firewall to determine whether the application is allowed to access the network?

file permission port number IRQ username 12 Which encryption technique uses a mathematical function to create a numeric value unique to the data? asymmetric encryption hash encoding VPN WTLS 13 Which technique may be used to generate a message digest from a hash encoding process? the use of a combination of identical encryption keys the use of a mathematical function to generate a corresponding text value that is unique to the message the use of the SHA or MD5 algorithms the use of a key that is agreed to by the sender and receiver 14 A technician needs to configure wireless networking on several new laptop computers. Which encryption method should the technician choose to achieve the best authentication and payload security? MD5 PGP WEP WPA 15 Which two methods help protect network cables? (Choose two.) enclosing the cables in conduits enclosing the cables in cable locks routing the cables inside the walls of a building leave cables exposed to reveal tampering using RFID tags

When planning a new network, the administrator is interested in a physical topology that is used more often than any other. Which topology is the administrator considering? bus mesh ring star 17 A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician? EXT FAT

FAT32 NTFS 18 Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled? Computers on a corporate network perform well without automatic updates because they are protected by a firewall. Home users should avoid automatic updates because they are protected by Windows Internet Connection Firewall. Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed. Guest user accounts with limited access are unlikely to ever need updates because they are temporary users. 19 A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed? packet filtering proxy stateful packet inspection stateless packet inspection 20 Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.) It costs less because it is more efficient. It does not impact the processing performance of the equipment it protects. It always protects both the computer it is installed on as well as the rest of the network. It is designed to protect more than one computer. It is a free Windows operating system component. 21 Which two hazards exist when working with fiber optic cabling? (Choose two.) chemicals copper strands electricity glass splinters connectors

ABC Company requires preventive maintenance for all local network cabling once a month. Which task should be included in the preventive maintenance program? Disconnect and reconnect all patch cables. Inspect all patch cables for breaks. Replace all labeling on the cables. Replace all cable supports to prevent loose attachment points. 2 A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access? Audit all user activity by using telnet to access each computer during the day. Enable event logging on each user computer to check for unauthorized network access. Enable event logging on all network devices to audit any suspicious user activity. Audit the event logs on the server to check for unauthorized network access. 3 ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called? data inspection logical survey plant inspection site survey 4 A technician needs to configure wireless networking on several new laptop computers. Which encryption method should the technician choose to achieve the best authentication and payload security? MD5 PGP WEP WPA 5 Which protocol provides secure transport of data from the company web server to remote users? HTTP HTTPS NetBEUI DNS 6 Which two hazards exist when working with copper cabling? (Choose two.) chemicals copper strands glass splinters light lightning 7 Which safety precaution should be used when working with any type of cable? Wear safety glasses when working any type of cable. Cordon off the area before crimping the cable heads.

Wear cloth gloves when working with any type of cable. Use a magnifying glass to divert light rays when working with fiber-optic cable. 8 The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.) availability distance operating system protocols reliability speed 9 How is the built-in Windows Start > Control Panel Start > Control Panel Start > Control Panel Start > Control Panel

XP firewall accessed? > Performance and Maintenance > Security Center > Internet Options > Security Center > Security Center > Network and Internet Connections > Security Center

10 As part of the new security policy, a company decides to protect company data by performing backups on a regular basis. Which backup type takes the greatest amount of time and is commonly used in conjunction with another backup method? differential full historical incremental 11 After booting a computer running Windows 2000, the following message displays: "The IP address already exists on another computer". Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.) run ipconfig /all run ipconfig /displaydns run ipconfig /flushdns run ipconfig /release run ipconfig /renew 12 The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Which path should the technician use to run the Add Printer wizard? Start > Run > prntwiz.exe Start > Control Panel > Add Hardware > Printers and Faxes > Add Printer Start > Administrative Tools > Services > Printers and Faxes > Add Printer Start > Control Panel > Printers and Faxes > File > Add Printer 13 Which quick solution should be tried first if a user is unable to login? Verify that the CAPS and NUM lock keys are not on. Reset the password for the user. Assign the user a new username and password. Add the user to a different group on the network. 14

Which simple wireless configuration technique can make the network invisible to unauthorized users? Change the default password on the WAP. Disable inactive wireless connections. Filter all network access using MAC addresses. Disable SSID broadcasting. 15 The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will complete the installation process? (Choose two.) Configure the device drivers. Configure the signal strength of the antenna. Configure the NICs with addressing information. Update the BIOS to support the new wireless NICs. Verify that the computers have a valid MAC address.

Related Documents

Dokument
October 2019 18
Dokument
August 2019 15
Dokument
August 2019 8
Dokument
August 2019 12
Dokument
November 2019 13

More Documents from ""

May 2020 9
Root Kit Reveal
May 2020 10
Icq Error Unit
June 2020 6
Icq
May 2020 12