Session 4 Flashcards

1
Q

Which items need to be updated regularly in an antivirus software program?

Choices:
A - Definitions
B - Drivers
C - Policies
D - Programs
A

A - Definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which three items help protect against unwanted software installations?

Choices:
A - Third-party restriction software
B - Adware
C - Device Guard
D - Single-factor authentication
E - Group Policy
A

A - Third-party restriction software
C - Device Guard

E - Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which item helps prevent potentially harmful programs from making changes to a user’s computer?

Choices:
A - User Account Control
B - Antivirus software
C - Encryption tab
D - Device-guard
A

A - User Account Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the business environment, antivirus software needs to be installed at the __________ level in order to best protect clients from bad email.

Choices:
A - user
B - client
C - micro server
D - server
A

D - server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which are antispam tools? Choose two answers.

Choices:
A - CRL
B - DNSBL
C - RBL
D - AL
E - ACL
A

B - DNSBL

C - RBL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disguising a malicious email with a legitimate email address is called __________.

Choices:
A - spoofing
B - phishing
C - whaling
D - smurfing
A

A - spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which record type is useful for filtering out spam?

Choices:
A - DSN ERC
B - DNS PTR
C - SLA DNS
D - NLS PRT
A

B - DNS PTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which two tools can be used to effectively defend against phishing?

Choices:
A - FormMail
B - User education
C - Docker swarm
D - ListServ
E - SmartScreen filtering
A

B - User education

E - SmartScreen filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Misdirecting users to fraudulent websites without their knowledge or consent is known as __________.

Choices:
A - pharming
B - smurfing
C - phishing
D - whaling
A

A - pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which email validation system allows administrators to specify which machines are authorized to transmit email from a domain?

Choices:
A - Threat Description Framework
B - Sender Policy Framework
C - Risk Policy Framework
D - Object Sender Framework
A

B - Sender Policy Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is one way to get server updates?

Choices:
A - Use a WSUS server
B - Use a RODC server
C - Use a WCCS database
D - Use a NECC database
A

A - Use a WSUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which three protocols should be disabled due to a lack of encryption?

Choices:
A - FTP with passwords
B - Anonymous FTP
C - PAP
D - Telnet
E - SFTP
A

A - FTP with passwords
C - PAP

D - Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which item should be installed after installing a domain controller in a branch office in order to secure its information?

Choices:
A - OSP
B - NVHS
C - DSRM
D - RODC
A

D - RODC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly