Security
Security
- Which type of authentication technology uses a credit card–sized device that stores information about the user?
- Smart card
- Credit card
- Keyless entry
- Biometrics
- What technology uses human body characteristics as a way of allowing users into a secured area?
- Smart card
- Biometrics
- PIN number
- Keyless entry
- What are special products that can protect you from viruses and malware?
- Antivirus software
- Malware protection
- Phishing protection
- All of these options are correct
- Which of the following can help protect your computer from inbound and outbound attacks?
- Gateway
- Router
- Software firewall
- Hub
- What are the three standards for encryption of wireless networks?
- WEP
- WPA
- WAP
- WPA2
- To prevent a hacker from obtaining useful information about a wireless network, what should you change from the manufacturer’s defaults? (Choose all that apply.)
- Reset the default password
- Change the SSID name
- Hide the SSID name
- All of these options are correct
- Windows 2000, Windows XP, and Windows Vista come with which type of encryption technology?
- NAT
- EFS
- User account
- WEP
- You are using a computer with Windows Vista Enterprise installed. You need to encrypt the entire disk for security purposes. What technology will allow you to do this?
- IPSEC
- EFS
- BitLocker
- L2TP
- When attackers ask questions to obtain information, what is this type of attack called?
- Social engineering
- System hacking
- Spam
- Spyware
- You are working on a Windows Vista computer. You keep getting messages from the operating system asking you for permissions. What is the name of this new feature?
- User State Migration
- User Account Control
- User State Control
- User Account Information
- Your company has a desktop that has a BIOS password assigned. The user who was in charge of the computer has left the company. What would you need to do to resolve this issue?
- Use a password reset CD.
- Reset the BIOS to the defaults.
- You cannot do this.
- Remove the jumper from the motherboard.
- You receive a call from a customer for whom you have just installed a wireless router. They tell you that they cannot connect to the router for Internet access. Which of the following solutions would you have them try?
- Reset the device to default.
- Turn the router off and back on.
- Make sure they are using the same passphrase to connect to the router.
- Tell them to re-run the wireless network setup wizard.
Answers
- A. A smart card contains user information and when used with a pin number to secure workstations gives you better security.
- B. Biometrics is a technology that can use fingerprints, voice, and retina scans as an authentication method.
- D. All of the listed products can help in the prevention of viruses, malware, and phishing scams. These need to be turned on and kept up to date to be effective.
- C. A software firewall is a program that examines data packets on a network to determine whether to forward them to their destination or block them. Firewalls can be used to protect against inbound threats only (one-way firewall) or against both unauthorized inbound and outbound traffic.
- A, B, D. The three standards are WEP, WPA, and WPA2. All are used to encrypt data on wireless networks.
- D. All wireless routers come with default SSID names, and passwords. You should change these, and hide the SSID name, to prevent a hacker from looking up the information about what type of WAP you are using.
- B. Windows Vista, XP, and 2000 have a built in encryption protocol called the Encrypting File System. Once applied, it can only be accessed by the user who created it and administrator or the EFS key holders.
- C. Windows Vista Ultimate and Enterprise include the option to use BitLocker Drive Encryption, which can encrypt an entire hard disk drive without a user’s knowledge.
- A. Social engineering is a simple and very easy way to get information from someone inside a company. By simply calling on the phone and pretending to be someone else, they can get information that should not be given out. Training users is the best way to prevent this kind of attack
- B. User Account Control (UAC) is a security component of Windows Vista that keeps every user (beside the actual Administrator account) in standard user mode instead of as an administrator with full administrative rights even if they are a member of the administrators group.
- D. If the BIOS setup program is protected by a password and the password is lost, you can clear the password on most desktop systems by using the BIOS clear jumper on the motherboard or by removing the battery for several seconds.
- C. After configuring a WAP or wireless router to provide WEP, WPA, or (preferably) WPA2 encryption, you must configure wireless clients with the same encryption information. You can set up clients manually or automatically. Note that each wireless client connecting to a WAP or wireless router must use the same encryption standard and passphrase and specify the SSID used by the WAP or wireless router
tamil chat |
tamil chat chennai
0 comments:
Post a Comment