Advertisement
Guest User

Untitled

a guest
Aug 19th, 2014
832
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.98 KB | None | 0 0
  1. 1. (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is (Points : 4)
  2. -Kerberos.
  3. CIPE (Crypto IP Encapsulation).
  4. IPSec (Internet Protocol Security).
  5. =SSL (Secure Sockets Layer).
  6.  
  7. Question 2. 2. (TCO 9) Just as with desktop computers, you might be able to solve a problem with a notebook that has an unstable system or a motherboard component by (Points : 4)
  8. replacing the screen.
  9. =-flashing BIOS.
  10. buying additional memory.
  11. verifying the software is activated.
  12.  
  13. Question 3. 3. (TCO 9) A Trojan horse (Points : 4)
  14. is a program that can replicate by attaching itself to another program.
  15. can spread copies of itself throughout a network without a host program.
  16. =does not need a host program to work; it pretends to be a legitimate program.
  17. -is dormant code added to software and triggered by a predetermined event.
  18.  
  19. Question 4. 4. (TCO 8) An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do? (Points : 4)
  20. =Manually delete the file.
  21. Repartition the hard drive.
  22. -Reload the operating system.
  23. Use a better antivirus application.
  24.  
  25. Question 5. 5. (TCO 8) A strong password should (Points : 4)
  26. combine uppercase and lowercase characters.
  27. use consecutive letters or numbers.
  28. contain at least six characters.
  29. =-All of the above
  30.  
  31. Question 6. 6. (TCO 8) What security term describes scrambling data so that it cannot be read? (Points : 4)
  32. =-Encryption
  33. Authentication
  34. Authorization
  35. Auditing
  36.  
  37. Question 7. 7. (TCO 8) A folder has both NTFS and shared folder permissions applied. What is the result of this action? (Points : 4)
  38. Whichever permission restricts the remote user the most is the one in effect.
  39. The NTFS permissions are in effect.
  40. The shared folder permissions are in effect.
  41. =-All permissions assigned are in effect.
  42.  
  43. Question 8. 8. (TCO 8) A _____ does not need a host program to work; rather, it substitutes itself for a legitimate program. (Points : 4)
  44. logic bomb
  45. =-Trojan horse
  46. virus
  47. browser hijacker
  48.  
  49. Question 9. 9. (TCO 8) What is SSID broadcasting? (Points : 4)
  50. The method the access point uses to reach all wireless NICs with a single message
  51. A means for the access point to send the wireless encryption keys to all wireless NICs for network access
  52. =-The access point constantly sending the name of the wireless network into the air
  53. The access method used for 802.11 a, b, g, and n wireless networks
  54.  
  55. Question 10. 10. (TCO 8) A technique in which an attacker captures a packet and uses computer information to pretend to be the sending computer is known as (Points : 4)
  56. =-a denial-of-service attack.
  57. session hijacking.
  58. spam.
  59. phishing.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement