Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Which is the best way to secure a laptop left at the office while the user is away for an extended period of
2 Cover the laptop with files and leave it on your desk.
Put the laptop in a desk drawer in your locked office.
Place the laptop in a locked security cage designed to store computer equipment.
Hide the laptop in your supervisor's office.
In which type of attack are TCP ports randomly opened to overload the network with a large number of fa
4 requests?
e-mail bomb attack
replay attack
spoofing attack
SYN flood attack
5 A company network has been subjected to several security attacks after installing TCP/IP on the company
computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user
and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deplo
man-in-the-Middle
ping of Death
replay
SYN Flood
7 Which task is in the scope of responsibilities of a network technician working with security updates and
patches?
submit a schedule to the manufacturer of when updates should be available
developing patches and updates
author signature files
installing patches and updates
What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the
8 recent viruses?
Download the latest signature files on a regular basis.
Schedule a scan once a week.
Schedule anti-virus updates using Windows Task Manager.
Follow the firewall configuration guidelines on the anti-virus manufacturer website.
9 A network administrator advised a user to use the postal service to mail a request for sensitive informatio
Which type of attack did the administrator want to prevent?
adware attack
DDoS attack
phishing attack
virus attack
1 A computer that is configured for automatic updates is shut down during a scheduled update. However, t
2 update is downloaded successfully without any file being corrupted in the process. What will happen to t
update as a result of this shutdown?
Notification for downloading available updates will be displayed when the computer is rebooted.
The update will be lost.
The update for the computer will be queued on the website.
The update will be installed as soon as the computer is powered on.
13 Which two actions can improve the data backup process? (Choose two.)
Ensure that the backup tapes are sent to an offsite location once a month.
Ensure that the data is often restored on a test server.
Ensure that the responsibility for conducting backups is frequently changed between users.
Schedule full backups on a regular basis.
Schedule a full backup once a year.
1 Which type of attack requires the use of passwords to gain access and run malicious programs?
7 spoofing attack
structured attack
SYN flood attack
unstructured attack
18 Which security device provides the highest level of security?
a biometric sensor
a card key
a key fob
a smart card
1 Which solution was designed to provide security for WAP devices in a bandwidth-efficient manner?
9 LEAP
WEP
WPA
WTLS
20 Which two practices help prevent unwanted access to data on a wireless network? (Choose two.)
changing the default administrator password
enabling the broadcasting of SSID
filtering the MAC addresses of computers
retaining the original firmware on all wireless devices
using 64-bit encryption as per the WEP standard
13.14.15.17.18