Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1. (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is (Points : 4)
- -Kerberos.
- CIPE (Crypto IP Encapsulation).
- IPSec (Internet Protocol Security).
- =SSL (Secure Sockets Layer).
- Question 2. 2. (TCO 9) Just as with desktop computers, you might be able to solve a problem with a notebook that has an unstable system or a motherboard component by (Points : 4)
- replacing the screen.
- =-flashing BIOS.
- buying additional memory.
- verifying the software is activated.
- Question 3. 3. (TCO 9) A Trojan horse (Points : 4)
- is a program that can replicate by attaching itself to another program.
- can spread copies of itself throughout a network without a host program.
- =does not need a host program to work; it pretends to be a legitimate program.
- -is dormant code added to software and triggered by a predetermined event.
- Question 4. 4. (TCO 8) An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do? (Points : 4)
- =Manually delete the file.
- Repartition the hard drive.
- -Reload the operating system.
- Use a better antivirus application.
- Question 5. 5. (TCO 8) A strong password should (Points : 4)
- combine uppercase and lowercase characters.
- use consecutive letters or numbers.
- contain at least six characters.
- =-All of the above
- Question 6. 6. (TCO 8) What security term describes scrambling data so that it cannot be read? (Points : 4)
- =-Encryption
- Authentication
- Authorization
- Auditing
- Question 7. 7. (TCO 8) A folder has both NTFS and shared folder permissions applied. What is the result of this action? (Points : 4)
- Whichever permission restricts the remote user the most is the one in effect.
- The NTFS permissions are in effect.
- The shared folder permissions are in effect.
- =-All permissions assigned are in effect.
- Question 8. 8. (TCO 8) A _____ does not need a host program to work; rather, it substitutes itself for a legitimate program. (Points : 4)
- logic bomb
- =-Trojan horse
- virus
- browser hijacker
- Question 9. 9. (TCO 8) What is SSID broadcasting? (Points : 4)
- The method the access point uses to reach all wireless NICs with a single message
- A means for the access point to send the wireless encryption keys to all wireless NICs for network access
- =-The access point constantly sending the name of the wireless network into the air
- The access method used for 802.11 a, b, g, and n wireless networks
- Question 10. 10. (TCO 8) A technique in which an attacker captures a packet and uses computer information to pretend to be the sending computer is known as (Points : 4)
- =-a denial-of-service attack.
- session hijacking.
- spam.
- phishing.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement