Chapter 17 Quiz Flashcards
Derek’s supervisor is concerned that the company’s security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network.
What does the computer or server use to verify the access to a specific resource on the network?
Access control list
Your company’s email server has been filling up employee’s email boxes with advertisements they did not request. You have been asked to research how to stop these types of messages from getting to your coworker’s email client software.
What will you recommend to your supervisor?
Enable the spam filter
Becky has been assigned to help with a major change to her company’s accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor causes the change to fail.
What is Becky’s mistake called?
Out of scope modification
Lance works for a company that allows users to bring their own devices to work. Last week Lance purchased a software package from a company that allows him to change fonts on pictures that he uses in his work presentations. Lance wants to share the program with his coworker Susan.
Is Lance allowed to share the software with Susan?
Susan would need to purchase the software from the company.
A customer called Derek to complain that her computer was running slow, so he went to the client work area and started troubleshooting the problem. Derek ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger.
Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize.
What should Derek perform next on the client’s computer?
Run memory diagnostics.
Download a CPU diagnostic program.
Run a virus scan.
Refresh Windows.
Run a virus scan.
Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center.
What is your company’s new security called?
Theft prevention
Mantrap
Entry control roster
Security outpost
Mantrap
Your company has decided that security is very important and wants to add a second security check that will identify its employees while they are logging in to their computers.
What type of security do you recommend?
Key fobs
Smart cards
Biometric locks
Hardware tokens
Biometric locks
Tracy works for an insurance company that recently received so much spam that the email server became overwhelmed and shut down. Tracy’s supervisor has asked her to make sure this does not happen again.
What is the first thing Tracy should do to prevent this problem from happening again?
User education
MAC filtering
Firewall
Email filtering
Email filtering
Your company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS.
What will you recommend as an upgrade to RADIUS?
RADIUS+
TACACS+
AES
WPA2
TACACS+
Kevin recently discovered that unknown processes are running in the background on his company’s web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website.
What type of attack occurred?
Botnet
Spyware
Zero-day
DDoS
Botnet
Recently, Frank’s computer has slowed down dramatically. He has also noticed that the time on the computer is not accurate. Frank has run several antivirus scans, but has not found an issue. Today while surfing the web, he was redirected several times to a website that he did not request. Then a BSOD error occurred on his computer, and when he turned on his computer, the antivirus software was disabled.
What kind of malware could be causing the issues on Frank’s computer?
Zombie
Rootkit
Spyware
Ransomware
Rootkit
You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.
What type of malware is on your computer?
Trojan
Ransomware
Rootkit
Virus
Virus
Gwen has discovered a program that has copied itself throughout the network. The program does not appear to have a host program and is overloading the network as it replicates. It has even installed a web server on the network and is allowing other computers to connect.
What type of malware has Gwen discovered?
Worm
Trojan
Spyware
Rootkit
Worm
The web server at Terry’s company recently was attacked by multiple computers. The attack overwhelmed the company’s web servers and caused the web servers to crash.
What type of attack occurred?
Botnet
Spyware
Zero-day
DDoS
DDoS
Jordan is talking with a client on the phone. Jordan’s company recently completed updates on the client’s system and something is not working properly. The client asks Jordan why the company is always doing updates. Jordan explain that updates help to secure computer systems.
What specific vulnerability do updates help prevent?
Zero-day
DDoS
Brute force
Man-in-the-middle
Zero-day
A customer called Derek to complain that her computer was running slow, so he went to the client work area and started troubleshooting the problem. Derek ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger.
Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize.
What should Derek perform next on the client’s computer?
Run memory diagnostics.
Download a CPU diagnostic program.
Run a virus scan.
Refresh Windows.
Run a virus scan.
Holly is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. She notices a problem when she tries to update Windows Defender and it fails. When Holly opens the Action Center she sees this screen.
What has happened to Holly’s computer?
She has received a spam message.
She has received a security alert message.
Someone has hijacked her email.
She has downloaded a rogue antivirus.
Your company’s email server has been filling up employee’s email boxes with advertisements for things they did not request. You have been asked to research how to stop these types of messages from getting to your coworker’s email client software.
What will you recommend to your supervisor?
Enable the firewall.
Enable the spam filter.
Enable port forwarding.
Enable MAC filtering.
Enable the spam filter.
The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked.
What should you do first to fix the problem with the Windows update?
Reinstall Windows.
Reinstall the network drivers.
Reinstall the security certificate.
Remove malware.
Remove malware.
Samantha is having an issue with Windows crashing and believes that malicious software is causing it to crash. Samantha also has received application errors that have cause the applications to close.
Which event log in the Event Viewer can Samantha inspect to see if malicious software is causing the Windows system to crash and the application errors, system errors, and other types of errors?
System logs
Security logs
Setup logs
Application
System logs
Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client’s desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When Lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When Lane arrived, she checked to see how much free space the computer had available and found that it had 250GB less than the day before.
What is the issue with the client’s computer?
Spam
Corrupt hard drive
Bad hard drive driver
Computer virus
Computer virus
An operating system is responsible for validating certificates used to secure communication. For Windows, Microsoft maintains a database of trusted root certificates issued by Certificate Authorities (CAs). A root certificate is the original certificate issued by the CA. When a Windows system opens a secure email or visits a secure website and encounters a new digital certificate, it requests Microsoft’s trusted root certificate, which is downloaded to the computer. The download happens seamlessly without the user’s knowledge unless there’s a problem. If Windows cannot obtain the root certificate to validate the email or website, an error is displayed.
Where do you go in the Windows operating system to view and delete root certificates?
Action Center
Certificate Manager
Windows Security
Windows Defender
Certificate Manager
Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore.
What does Victoria need to do to run the antivirus software on System Restore?
Disable System Protection.
Back up the restore point.
Enable System Protection.
Run the antivirus software on a restore point.
Disable System Protection.
Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer.
What should she do before she runs the anti-malware program?
Install Windows updates.
Update malware drivers.
Update malware software.
Update malware signatures.
Update malware signatures.