Sunteți pe pagina 1din 46

1 Formularbeginn

A network technician has received several reports regarding missing and corrupted information
on a company file server. Which course of action can the technician use to investigate any
unauthorized network access?

Audit all user activity by using telnet to access each computer during the day.

Enable event logging on each user computer to check for unauthorized network access.

Enable event logging on all network devices to audit any suspicious user activity.

Audit the event logs on the server to check for unauthorized network access.

Formularende

Max
Observable Description
Value

2 points for Option 4


correctness of
1 0 points for any other 2
response
option

2 Formularbeginn
Which two advantages are attributed to a hardware firewall when compared to a software
firewall? (Choose two.)
It costs less because it is more efficient.

It does not impact the processing performance of the equipment it protects.

It always protects both the computer it is installed on as well as the rest of the network.

It is designed to protect more than one computer.

It is a free Windows operating system component.

Formularende

Max
Observable Description
Value

Option 2 and Option 4 are correct.


correctness of 1 point for each correct option.
1 2
response 0 points if more options are selected
than required.

3 Formularbeginn
A company wants to configure a firewall to monitor all channels of communication and allow only
traffic that is part of a known connection. Which firewall configuration should be deployed?

packet filtering
proxy

stateful packet inspection

stateless packet inspection

Formularende

Max
Observable Description
Value

2 points for Option 3


correctness of
1 0 points for any other 2
response
option

4 Formularbeginn
A technician has been asked to format the drives of several Windows XP computers with a file
system that can use file-level permissions to secure confidential information. Which file system
should be used by the technician?

EXT

FAT
FAT32

NTFS

Formularende

Max
Observable Description
Value

2 points for Option 4


correctness of
1 0 points for any other 2
response
option

5 Formularbeginn
A technician needs to configure wireless networking on several new laptop computers. Which
encryption method should the technician choose to achieve the best authentication and payload
security?

MD5

PGP

WEP

WPA
Formularende

Max
Observable Description
Value

2 points for Option 4


correctness of
1 0 points for any other 2
response
option

6 Formularbeginn
Which simple wireless configuration technique can make the network invisible to unauthorized
users?

Change the default password on the WAP.

Disable inactive wireless connections.

Filter all network access using MAC addresses.

Disable SSID broadcasting.

Formularende

Observable Description Max


Value

2 points for Option 4


correctness of
1 0 points for any other 2
response
option

7 Formularbeginn
Windows XP should be updated on a regular basis. In which situation should automatic updates
be disabled?

Computers on a corporate network perform well without automatic updates because they are
protected by a firewall.

Home users should avoid automatic updates because they are protected by Windows Internet
Connection Firewall.

Users accessing the network using a dial-up connection need to control when the updates are
downloaded and installed.

Guest user accounts with limited access are unlikely to ever need updates because they are
temporary users.
Formularende

Max
Observable Description
Value

2 points for Option 3


correctness of
1 0 points for any other 2
response
option
8 Formularbeginn
As part of the new security policy, a company decides to protect company data by performing
backups on a regular basis. Which backup type takes the greatest amount of time and is
commonly used in conjunction with another backup method?

differential

full

historical

incremental

Formularende

Max
Observable Description
Value

2 points for Option 2


correctness of
1 0 points for any other 2
response
option

9 Formularbeginn
Which quick solution should be tried first if a user is unable to login?
Verify that the CAPS and NUM lock keys are not on.

Reset the password for the user.

Assign the user a new username and password.

Add the user to a different group on the network.

Formularende

Max
Observable Description
Value

2 points for Option 1


correctness of
1 0 points for any other 2
response
option

10 Formularbeginn
Which three items should be included in a local security policy? (Choose three.)

list of approved ISPs

steps to take in the event of a security breach


contact list in the event of an emergency

details defining employment eligibility

complete schedule of lunch and break times for all employees

process for employees to gain access to equipment and data

Formularende

Max
Observable Description
Value

Option 2, Option 3, and Option 6 are


correct.
correctness of
1 1 point for each correct option. 3
response
0 points if more options are selected
than required.

11 Formularbeginn
Which two hashing algorithms are used to ensure that messages are unaltered during
transmission? (Choose two.)

ARP
DLC

MD5

NTP

SHA

TCP

Formularende

Max
Observable Description
Value

Option 3 and Option 5 are correct.


correctness of 1 point for each correct option.
1 2
response 0 points if more options are selected
than required.

12 Formularbeginn
Which encryption technology provides secure tunnels?
asymmetric encryption

hash encoding

symmetric encryption

VPN

Formularende

Max
Observable Description
Value

2 points for Option 4


correctness of
1 0 points for any other 2
response
option

13 Formularbeginn
Which three physical security measures are employed to prevent security breaches and loss of
data? (Choose three.)

antivirus program

software firewall
conduit

card key

strong password

security guard

Formularende

Max
Observable Description
Value

Option 3, Option 4, and Option 6 are


correct.
correctness of
1 1 point for each correct option. 3
response
0 points if more options are selected
than required.

14 Formularbeginn
Which data security technology takes the form of an object which must be close to a computer
before the user can successfully submit a username and password?

biometric device
security key fob

smart card

thumb drive

Formularende

Max
Observable Description
Value

2 points for Option 2


correctness of
1 0 points for any other 2
response
option

15 Formularbeginn
Which physical security technology uses an embedded integrated circuit chip to store data safely
and is commonly used in secure ID badges?

smart card

security key fob

storage area network


biometric device

Formularende

Max
Observable Description
Value

2 points for Option 1


correctness of
1 0 points for any other 2
response
option

16 Formularbeginn
Which two file-level permissions allow a user to delete a file? (Choose two.)

read

modify

read and execute

write

full control
list contents

Formularende

Max
Observable Description
Value

Option 2 and Option 5 are correct.


correctness of 1 point for each correct option.
1 2
response 0 points if more options are selected
than required.

17 Formularbeginn
What is the default setting for Windows XP operating system updates?

automatic

only download updates

notify me

manual

Formularende
Max
Observable Description
Value

2 points for Option 1


correctness of
1 0 points for any other 2
response
option

18 Formularbeginn
Which Windows XP command initiates a backup from the command line?

archive

backup

compress

ntbackup

zip

Formularende

Max
Observable Description
Value

1 correctness of 2 points for Option 4 2


0 points for any other
response
option

19 Formularbeginn
After a technician collects information from the computer, which two sources can provide the
technician with possible solutions for various types of network-related problems? (Choose two.)

paperwork that is provided to customers

the manufacturer FAQ for network devices

firewall logs

network device logs

technical websites

Formularende

Max
Observable Description
Value

1 correctness of Option 2 and Option 5 are correct. 2


response 1 point for each correct option.
0 points if more options are selected
than required.

20 Formularbeginn
A customer contacts a call center with problems updating anti-virus software. What two types of
question should the technician consider when gathering information from the caller? (Choose
two.)

closed-ended

direct

indirect

open-ended

system-specific

vendor-specific

Formularende

Max
Observable Description
Value

1 correctness of Option 1 and Option 4 are correct. 2


1 point for each correct option.
response 0 points if more options are selected
than required.

21 Formularbeginn
Which two characteristics of network traffic are being monitored if a network technician
configures the company firewall to operate as a packet filter? (Choose two.)

applications

physical addresses

packet size

ports

protocols

Formularende

Max
Observable Description
Value

1 correctness of Option 4 and Option 5 are correct. 2


response 1 point for each correct option.
0 points if more options are selected
than required.

22 Formularbeginn
A technician is asked whether the new procedures for backup use a backup rotation. Which
procedure describes a backup rotation?

Reuse backup media and choose its storage location according to organizational guidelines.
This ensures efficient and safe use of the backup media.

Have different members of the network staff perform the backups so that everyone has
experience backing up data.

Back up the data at different times on different days so that a diverse amount of data is
backed up.

Select the partitions to be archived at each backup according to a predefined plan to ensure
everything is backed up over a given period.
Formularende

Max
Observable Description
Value

2 points for Option 1


correctness of
1 0 points for any other 2
response
option

23 Formularbeginn
The ABC Company network designers are designing the new
corporate WiFi network. Which two precautions should be
implemented because of security concerns with wireless
networks? (Choose two.)

Shield the access point with a Faraday cage.

Send only essential passwords in clear text.

Disable broadcast of the SSID.

Configure WPA on access points.

Use the 2.4 GHz frequency band.

Use the 5.0 GHz frequency band.

Formularende

Max
Observable Description
Value

Option 3 and Option 4 are correct.


correctness of 1 point for each correct option.
1 2
response 0 points if more options are
selected than required.
1 Formularbeginn
What is the purpose of using hash encoding?
to ensure complete security of the message digest

to ensure that the data remains the same even if the message digest is tampered with

to ensure that tampering with data is detectable

to regenerate the message digest when the original message digest is changed
Formularende

Observable Description Max Value


2 points for Option 3
correctness of
1 0 points for any other 2
response
option

2 Formularbeginn
Which feature must be enabled to monitor network activity within Windows XP?
hash encoding

logging and auditing

password protection

symmetric encryption
Formularende

Observable Description Max Value


2 points for Option 2
correctness of
1 0 points for any other 2
response
option

3 Formularbeginn
Which item is kept secret in symmetric encryption?
the mathematical function

the encryption key

the event log files

the message digest


Formularende

Observable Description Max Value


2 points for Option 2
correctness of
1 0 points for any other 2
response
option

4 Formularbeginn
Which device is used to ensure secure credit card payments?
card key

conduit

security key fob


smart card
Formularende

Observable Description Max Value


2 points for Option 4
correctness of
1 0 points for any other 2
response
option

5 Formularbeginn
Which security device communicates with the computer over a short range?
biometric device

conduit

security key fob

smart card
Formularende

Observable Description Max Value


2 points for Option 3
correctness of
1 0 points for any other 2
response
option

6 Formularbeginn
Which solution, when deployed on a network, looks for policy matches via the use of IP
addresses and port numbers?
dual-homed gateway

packet filter firewall

proxy firewall

stateful inspection firewall


Formularende

Observable Description Max Value


2 points for Option 2
correctness of
1 0 points for any other 2
response
option

7 Formularbeginn
Which security element operates independently of computer resources?
antispyware program

antivirus program

hardware firewall

software firewall
Formularende

Observable Description Max Value


1 correctness of 2 points for Option 3 2
response 0 points for any other
option

8 Formularbeginn
A network administrator disabled SSID transmission in a wireless network that is equipped with
WPA. However, an attacker managed to penetrate the network. The administrator then
deployed a wireless security configuration tool to restrict access to listed clients. Which tool did
the network administrator install?
MAC address filtering

WEP

wireless antenna

packet filtering
Formularende

Observable Description Max Value


2 points for Option 1
correctness of
1 0 points for any other 2
response
option

9 Formularbeginn
What is a feature of restrictive firewall security policy?
It enables a specific list of ports, and only packets entering through those ports are
permitted.
It restricts the running of software to administrator accounts.

It limits the number of users who can access the network.


It permits access through all ports except those that are explicitly denied.
Formularende

Observable Description Max Value


2 points for Option 1
correctness of
1 0 points for any other 2
response
option

10 Formularbeginn
When Windows Update is being configured on a computer with Windows XP, which option
can conflict with the security policy of an organization?
Automatic updates

Download updates

Notify me

Turn off automatic updates


Formularende

Observable Description Max Value


2 points for Option 1
correctness of
1 0 points for any other 2
response
option

11 Formularbeginn
A vendor needs to work in the company office for two weeks. Which type of account should be
created for the vendor?
a guest account along with partial access to the network

a new account that gives the same privileges as company employees have

a re-enabled account of a former employee

a temporary account along with full access to the network


Formularende

Observable Description Max Value


2 points for Option 1
correctness of
1 0 points for any other 2
response
option

12 Formularbeginn
Which backup method will always ensure that all data could be restored from a single backup?
daily backup

differential backup

incremental backup

full backup
Formularende

Observable Description Max Value


1 correctness of 2 points for Option 4 2
0 points for any other
response
option

13 Formularbeginn
While gathering data to troubleshoot a problem with a computer, the technician asked various
questions. Which question is a closed-ended question?
Has the password been changed recently?

When did the problem start?

What type of firewall is being used?

What types of backups were used to back up the data on the computer over the last month?
Formularende

Observable Description Max Value


2 points for Option 1
correctness of
1 0 points for any other 2
response
option

14 Formularbeginn
Which software application monitors and reports the changes in program code?
an application that protects the computer from adware

a patch to an application

a firewall application
IDS
Formularende

Observable Description Max Value


2 points for Option 4
correctness of
1 0 points for any other 2
response
option

15 Formularbeginn
Which encryption technology uses the SHA and MD5 algorithms?
asymmetric encryption

hash encoding

symmetric encryption

VPN
Formularende

Observable Description Max Value


2 points for Option 2
correctness of
1 0 points for any other 2
response
option

16 Formularbeginn
Which action provides superior protection for a wireless network?
configuring WEP with 32-bit encryption

configuring WPA

disabling MAC address filtering

retaining the default SSID


Formularende

Observable Description Max Value


2 points for Option 2
correctness of
1 0 points for any other 2
response
option

17 Formularbeginn
Why is the Notify me Windows update option more suitable for dial-up connections?
It allows the user to control the update to prevent interruption of other network activity.

It automatically downloads updates and notifies the user to install them later.

It automatically installs updates when the user is not working on the computer.

It prevents checking for updates.


Formularende

Observable Description Max Value


1 correctness of 2 points for Option 1 2
response 0 points for any other
option

18 Formularbeginn
After a technician collects information from the computer, which two sources can provide the
technician with possible solutions for various types of network-related problems? (Choose
two.)
paperwork that is provided to customers

the manufacturer FAQ for network devices

firewall logs

network device logs

technical websites
Formularende

Max
Observable Description
Value
Option 2 and Option 5 are correct.
correctness of 1 point for each correct option.
1 2
response 0 points if more options are selected
than required.

19 Formularbeginn
After analyzing and researching the problem by visiting several technical websites, a technician
was unable to help a user to log in. Later, the user rebooted the computer and was able to log in.
Which step did the technician omit during the troubleshooting process?
closing the issue with the customer
gathering data from the computer

gathering information from the user

trying quick solutions


Formularende

Observable Description Max Value


2 points for Option 4
correctness of
1 0 points for any other 2
response
option

20 Formularbeginn
Which security technique provides secure tunnels?
asymmetric encryption

hash encoding

symmetric encryption

VPN
Formularende

Max
Observable Description
Value
2 points for Option 4
correctness of
1 0 points for any other 2
response
option
Formularbeginn

1 Which encryption technique uses a mathematical function to create a numeric value unique
to the data?
asymmetric encryption

hash encoding

VPN

WTLS
Formularende

Max
Observable Description
Value
2 points for Option 2
correctness of
1 0 points for any other 2
response
option

2 Formularbeginn
Which two methods help protect network cables? (Choose two.)
enclosing the cables in conduits

enclosing the cables in cable locks

routing the cables inside the walls of a building

leave cables exposed to reveal tampering


using RFID tags
Formularende

Max
Observable Description
Value
Option 1 and Option 3 are correct.
correctness of 1 point for each correct option.
1 2
response 0 points if more options are selected
than required.

3 Formularbeginn
Which method of filtering traffic is used to monitor established network connections to allow
only packets from established network connections?
packet filter

proxy firewall

stateful packet inspection

wireless NICs
Formularende

Observable Description Max Value


2 points for Option 3
correctness of
1 0 points for any other 2
response
option

4 Formularbeginn
Which Windows XP command performs a data backup?
BACKUP

BUP

NTBACKUP

XPBACKUP
Formularende

Observable Description Max Value


2 points for Option 3
correctness of
1 0 points for any other 2
response
option

5 Formularbeginn
What is a disadvantage of configuring a firewall using permissive settings?
Devices are exposed to attack.
Packet transmission becomes complicated, requiring explicit access permission for all
packets.
The extra ports that are used by various applications are closed.

The settings may cause a user to be locked out of the system.


Formularende

Observable Description Max Value


1 correctness of 2 points for Option 1 2
0 points for any other
response
option

6 Formularbeginn
Which feature is characteristic of a guest account?
It always remains active.

It can be configured to grant extensive access to resources on a temporary basis.

It disables access to the Internet, e-mail, and any printer.

It must be specifically configured for each guest.


Formularende

Observable Description Max Value


2 points for Option 2
correctness of
1 0 points for any other 2
response
option

7 Formularbeginn
Which technique may be used to generate a message digest from a hash encoding process?
the use of a combination of identical encryption keys
the use of a mathematical function to generate a corresponding text value that is unique to
the message
the use of the SHA or MD5 algorithms

the use of a key that is agreed to by the sender and receiver


Formularende

Observable Description Max Value


2 points for Option 3
correctness of
1 0 points for any other 2
response
option

8 Formularbeginn
Which method can turn a laptop into a zombie computer?
improperly configuring the BIOS setting

partially uninstalling the operating system

reformatting the hard drive

remotely controlling the operating system


Formularende

Observable Description Max Value


2 points for Option 4
correctness of
1 0 points for any other 2
response
option

9 Formularbeginn
After a technician collects information from the computer, which two sources can provide the
technician with possible solutions for various types of network-related problems? (Choose
two.)
paperwork that is provided to customers

the manufacturer FAQ for network devices

firewall logs

network device logs

technical websites
Formularende

Max
Observable Description
Value
Option 2 and Option 5 are correct.
correctness of 1 point for each correct option.
1 2
response 0 points if more options are selected
than required.

10 Formularbeginn
After analyzing and researching the problem by visiting several technical websites, a technician
was unable to help a user to log in. Later, the user rebooted the computer and was able to log in.
Which step did the technician omit during the troubleshooting process?
closing the issue with the customer

gathering data from the computer

gathering information from the user

trying quick solutions


Formularende
Observable Description Max Value
2 points for Option 4
correctness of
1 0 points for any other 2
response
option

11 Formularbeginn
What is the purpose of using hash encoding?
to ensure complete security of the message digest

to ensure that the data remains the same even if the message digest is tampered with

to ensure that tampering with data is detectable

to regenerate the message digest when the original message digest is changed
Formularende

Observable Description Max Value


2 points for Option 3
correctness of
1 0 points for any other 2
response
option

12 Formularbeginn
Which characteristic of an application is used by the Windows XP firewall to determine
whether the application is allowed to access the network?
file permission
port number

IRQ

username
Formularende

Observable Description Max Value


2 points for Option 2
correctness of
1 0 points for any other 2
response
option

13 Formularbeginn
Which right can only be granted by enabling the Full Control file-level permission?
change the permissions of a file

delete a file

overwrite a file

run a file
Formularende

Observable Description Max Value


2 points for Option 1
correctness of
1 0 points for any other 2
response
option
14 Formularbeginn
Which two advantages are attributed to a hardware firewall when compared to a software
firewall? (Choose two.)
It costs less because it is more efficient.

It does not impact the processing performance of the equipment it protects.

It always protects both the computer it is installed on as well as the rest of the network.

It is designed to protect more than one computer.

It is a free Windows operating system component.


Formularende

Max
Observable Description
Value
correctness of Option 2 and Option 4 are correct.
response 1 point for each correct option.
1 2
0 points if more options are selected
than required.

15 Formularbeginn
A technician has been asked to format the drives of several Windows XP computers with a file
system that can use file-level permissions to secure confidential information. Which file system
should be used by the technician?
EXT

FAT
FAT32

NTFS
Formularende

Observable Description Max Value


2 points for Option 4
correctness of
1 0 points for any other 2
response
option

16 Formularbeginn
A technician needs to configure wireless networking on several new laptop computers. Which
encryption method should the technician choose to achieve the best authentication and payload
security?
MD5

PGP

WEP

WPA
Formularende

Observable Description Max Value


2 points for Option 4
correctness of
1 0 points for any other 2
response
option
17 Formularbeginn
What is the default setting for Windows XP operating system updates?
automatic

only download updates

notify me

manual
Formularende

Observable Description Max Value


2 points for Option 1
correctness of
1 0 points for any other 2
response
option

18 Formularbeginn
A user can locate the setup for an application on the server but is unable to download it. The
user requests the help of a technician, who looks up the list of common problems and their
recommended solutions. Which solution should the technician try to resolve this problem?
Change the read permission granted to the user on the setup file to read and execute.

Grant system administrator privileges to the user on a temporary basis.

Inform the user that this is due to a phishing attack and then perform an antivirus scan.

Verify that the MAC address of the computer is listed in the MAC address filter table.
Formularende
Observable Description Max Value
2 points for Option 1
correctness of
1 0 points for any other 2
response
option

19 Formularbeginn
Which physical security technology uses an embedded integrated circuit chip to store data
safely and is commonly used in secure ID badges?
smart card

security key fob

storage area network

biometric device
Formularende

Observable Description Max Value


2 points for Option 1
correctness of
1 0 points for any other 2
response
option

20 Formularbeginn
Which two NTFS file-level permissions allow a user to delete a file? (Choose two.)
amend

delete
full control

modify

write
Formularende

Max
Observable Description
Value
Option 3 and Option 4 are correct.
correctness of 1 point for each correct option.
1 2
response 0 points if more options are selected
than required.

Formularbeginn

Formularbeginn
12622611514347

Formularende

Formularende

S-ar putea să vă placă și