11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Advanced Security 274. Which type of attack is launched by a hacker appearing to be a trusted organization andsending e-mail to trick the user into providing confidential information?a. Denial of serviceb. Graywarec. Phishingd. Trojan5. Where should a technician begin gathering data when troubleshooting a computer -problem?a. Operating system knowledge baseb. Operating system logsc. Userd. Vendor of the computer6. A security consultant is trying to find a hardware device that will allow only authorizedusers to access confidential data. Which device will ensure that the data will be accessibleby authorized employees only?a. Cable lockb. Docking station lockc. Lockable cased. Security dongle7. On a Windows XP network, which task is necessary to ensure that any operating systemvulnerabilities are removed and that identified errors are repaired?a. Audit both the system and user files on the computer system on a regular basis.b. Use a software-based firewall on a regular basis.c. Install a third-party spyware program to monitor traffic on a regular basis.d. Download and install operating system updates on a regular basis.8. A technician notes that the corporate security policy is referred to as a restrictive securitypolicy. Which definition describes a restrictive security policy?a. Any traffic not specifically denied is permitted.b. Only traffic entering the network through specific ports is permitted.c. Any traffic not specifically permitted is denied.d. Traffic is permitted only after it successfully passes all configured securitymeasures.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!