TestOut PC Pro A+ 220-801 – 220-802 – Security

Your page rank:

Total word count: 3222
Pages: 12

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which of the following security solutions would prevent a user from reading a file which she did not create?


You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become victim of a social engineering attack. What should you recommend they do to mitigate the risk?

Teach users how to recognize and respond to social engineering attacks

One of the Windows 7 workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other’s files. What else could you do to increase the security of this system? (select two)

1) Disable autorun on the system 2) Set a screensaver password

A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following:

* They use an 802.11a wireless network
* The wireless network SSID is set to BWLAN
* The wireless network uses WPA2 with AES security
* Omni-directional access points are positioned around the periphery of the building

Based on this information, what should you recommend your client do to increase their wireless network security?

Implement directional access points

Which of the following is the process of fixing problems detected by anti-virus software so that the computer is restored to its original state?


You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the internet. These computers were previously used for storing sensitive information. What should you do prior to getting rid of the computers?

Use data wiping software to clear the HDDs

What is the best countermeasure against social engineering?

User awareness training

Which of the following are biometric devices? (select two)

1) Retina scanner 2) Face scanner

What is the main difference between a worm and a virus?

A worm can replicate itself and does not need a host for distribution

A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won’t let her authenticate, claiming the wrong password has been entered. What’s causing the problem?

She has turned Num Lock on causing the numbers to be sent from the keyboard instead of letters

To access your company’s internal network from home, you use Secure Shell (SSH). The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home?


You are responsible for disposing of several old workstations formerly used by accountants in your organization’s Finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the HDDs is erased. To do this, you use the Windows XP Installation CDs that came with these systems to delete all partitions from the HDDs. Have you properly prepared these systems for disposal?

No, you should use disk wiping software to fully erase the drives

You are configuring a network firewall to allow SMTP outbound e-mail traffic, and POP3 inbound e-mail traffic. Which of the following IP ports should you open on the firewall? (select two)

1) 25 2) 110

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again. Which policies should you configure? (select two)

1) Enforce password history 2) Minimum password age

Which of the following best describes spyware?

It monitors the actions you take on your machine and sends the information back to its originating source

Which of the following are common forms of social engineering attack?

Hoax virus information e-mails

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device:

* They use an 802.11n wireless network
* The wireless network is broadcasting an SSID of Linksys
* The wireless network uses WPA2 with AES security
* Directional access points are positioned around the periphery of the building

Based on this information, what should you recommend you client do to increase their wireless network security ? (select two)

1) Disable SSID broadcast 2) Change the SSID to something other than the default

A user reports that her machine is behaving erratically. She suspects something is wrong because lately a firewall alert keeps indicating programs are trying to access the Internet, and several files have disappeared or have been renamed. What do you suspect is causing these problems?

Malware infection

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an e-mail with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. What has happened to the file?

It has been moved to a folder on your computer

One of the Windows 7 workstations you manage has four user accounts defines on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other’s files. Autorun has been disabled on the system. What should you do to increase security of this system?

Disable the Guest account

You want to be able to access your home computer using Remove Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer from outside of your home network. What should you do?

Open the firewall port from the Remote Desktop program

While trying to log on, a user accidentally typed the wrong password three times, and now the system tells him that he can’t log on because of too many incorrect passwords. He still remembers his password, but just typed it wrong. He needs access as quickly as possible. What should you do?

Unlock the account

Which of the following is an example of a strong password?


Several users have forwarded you an e-mail stating that your computer company’s health insurance provider has just launched a new web site for all employees. To access he site they are told in the e-mail to click a link and provide their personal information. Upon investigation, you discover that your company’s health insurance provider did not send this e-mail. What kind of attack just occurred?


You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?

Use cable locks to chain the laptops to the desks

What is the program that appears to be a legitimate application, utility, game, or screensaver and that performs malicious activities surreptitiously?

Trojan horse

You are a security consultant and have been hired to evaluate an organization’s physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization’s CEO. Network jacks are provided in the reception area such that employees and vendors can easily access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. What recommendations would you make to this organization to increase their security? (select two)

1) Disable the network jacks in the reception area 2) Train the receptionist to keep her iPad in a locked drawer when not in use

You have just installed anti-virus software on all computers in your company network. Which additional actions should you take to help protect systems from malicious software? (select two)

1) Train users to scan removable storage devices before copying files 2) Train users to update the virus definition files frequently

Which of the following is a hardware device that contains identification information and which can be used to control building access or computer logon?

Smart card

Which type of biometric authentication uses the ridges of your skin?


Which of the following could easily result in a mailbox being so full that messages can’t be received?


Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

What are the most common means of virus distribution? (select two)

1) Malicious web sites 2) E-mail

Which of the following protocols establish a secure connection and encrypt data for a VPN? (select three)

1) PPTP 2) L2TP 3) IPSec

What is the key characteristic of a worm?

A worm can replicate itself and spread to other systems

What are examples of a strong password? (select two)

1) il0ve2EatIceCr3am 2) TuxP3nguinsRn0v3l

Which of the following is the best device to deploy to protect your private network from a public untrusted network?


Which of the following actions taken directly improves system security on Windows systems? (select two)

1) Install anti-virus software 2) Enable the Windows firewall

Which security practice is an example of the Principle of Least Privilege?

All users on a Windows workstation are limited users except for one user who is responsible for maintaining the system

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which policies should you configure? (select two)

1) Account lockout threshold 2) Minimum password length

While browsing the Internet, you notice that the browser display pop-ups that are targeted towards recent keyboard searches you have performed. What is this an example of?


Which of the following forms of networking is highly susceptible to eavesdropping (data interception) and must be secured accordingly?


A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the Internet, and that the malware corrupted the boot block. Based on your suspicions , what actions could you take to correct the problem? (select two)

1) Boot from the Windows 7 installation DVD and use the Recovery Environment to run a startup repair 2) Reimagine the machine

Which of the following provides security for wireless networks?


In which of the following situations should you install a firewall?

You want to restrict Internet users from accessing private data on your network

You have a computer that runs Windows 7. Where would you go to check if the system can recognize and use any installed anti-virus software?

Security Center

You need to enable a screen saver password on the Windows 7 workstations in your organization. Which Control Panel option should you use to do this?


You manage two computers with the following user accounts:

* Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does.
* Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not

You are working from Wrk2 and would like to access a shared folder on Wrk1. What credentials should you use to access the shared folder?

Type Admin for the user and specify the password

While running a full system scan using your anti-virus program, three files have been identified as possible problems. You want to keep the files untouched so you can examine them later. However, you want to make sure the files do not do any harm on your computer. What actions should you take?

Quarantine the files

You’ve just received an e-mail message that indicates a new serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of the three files in \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. What should your first action based on this message be?

Verify the information on well-known malicious code threat management web sites

You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?

Web server, e-mail server

After installing some software a few days ago, your DVD drive tray randomly began to open and close. Today, you were called into your boss’s office to discuss why you are calling 900 numbers while at work. Which type of malware would create these symptoms?


If your anti-virus software does not detect and remove a virus, what should you try first?

Update your virus detection software

Which of the following is not a form of biometrics?

Token device

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would best prevent this scenario from occurring again?

Configure the software to automatically download the virus definition files as soon as they become available

You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to best prevent extracting data from the discs?


You have installed anti-malware software on a computer that only you use. You want to protect the computer from files that you download from the Internet. What should you do next time to make sure that there aren’t any existing files on your system that are infected?

Run a full scan

Which type of malicious activity can be described as numerous unwanted and unsolicited e-mail messages sent to a wide range of victims?


Your organization is frequently visited by sales reps. While on-site, they frequently plug their notebook systems into any available wall jack, hoping to get Internet connectivity. You are concerned that allowing them to do this could result i the spread of malware throughout your network. What should you do? (select two)

1) Implement MAC address filtering 2) Implement static UP addressing

What is a cookie?

A file saved on your HDD that tracks web site preferences and use

Which TCP/IP protocol is a secure form of HTTP and uses SSL as a sublayer for security?


Which of the following is the most common form of authentication?

Username and password

Which of the following security measures is a form of Biometrics?

Fingerprint scanner

Which of the following actions adds new features and fixes bugs for anti-malware software?

Updating the anti-malware engine

An intruder waits near an organization’s secured entrance until an employee approaches the entrance and unlocks it with a security badge. The intruder falls in line behind the employee, who assumes the intruder is another employee and holds the door open for her. What kind of attack just occurred?


You discover that a system on your network has been infected with a worm. What is the best way to prevent the spread of the worm to other systems while you work on removing the worm?

Quarantine the computer

Which of the following is a form of attack that tricks victims into providing confidential information, such as identify information or logon credentials, through e-mails ow Web sites that impersonate an online entity that the victim trusts, such as a financial institution or well known e-commerce site?


You have installed anti-virus software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again?

User awareness training

Which of the following is a firewall function?

Packet filtering

What do biometrics use to perform authentication to identify?

Human characteristics

Your anti-virus software has detected malware on your system. However, the anti-virus software is unable to remove it, and when you try to delete the files, you can’t because they are in use. What should you try first?

Boot into Safe Mode and try removing the malware

Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following:

* Server systems are kept in a locked server room
* User accounts on desktop systems have strong passwords assigned
* A locked door is used to control access to the work area. Users must use ID badges to enter the area
* Users connect their personal mobile devices to their computers using USB cables
* Users work in three 8-hour shifts per day. Each computer is shared by three users. Each user has a limited account on the computer they use

Based on this information, what should you recommend your client do to increase security?

Disable the USB ports on the user’s workstations

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?


To increase security on your company’s internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?


You want a security solution that protects the entire HDD, preventing access even when it is moved to another system. Which solution would you choose?


Which of the following are examples of social engineering? (select two)

1) Dumpster diving 2) Shoulder surfing

Which of the following security measures encrypts the entire contents of a HDD?


Following Windows installation, you enabled the built-in Administrative account. You remove the password for this account. You enable Remote Desktop on your computer using the default settings. From home, you try to access your computer using Remote Desktop using the Administrator account, but you are unable to log on. What should you do?

Configure a password for the Administrator account

Share This

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more


A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message