You suspect a user's computer is infected by a virus. What should you do first?
A. Restart the computer in safe mode
B. Replace the computer's hard disk drive
C. Disconnect the computer from the network
D. Install antivirus software on the computer
Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
A. Phishing
B. Malware
C. Reverse Social engineering
D. No change is needed
Which attack listens to network traffic of a computer resource?
A. Resource gathering
B. Denial of service
C. ARP poisoning
D. Eavesdropping
E. Logic bomb
You have two servers that run Windows Server. All drives on both servers are formatted by using NTFS.
You move a file from one server to the other server. The file's permissions in the new location will:
A. Enable full access to the everyone group
B. Restrict access to the Administrators group
C. Inherit the destination folder's permissions
D. Retain the original folder's permissions
You need to be able to gather information about a running program.
Which type of auditing should you implement?
A. directory services
B. object access
C. logon events
D. process tracking
Which of the following is a collection or list of user accounts or computer accounts?
A. Group
B. Active Directory
C. Domain
D. Public folder
Which of the following can be implemented to decrease the number of times a user is required to be authenticated for access a particular resource?
A. TCP/IP protocol
B. Network Directory Access Protocol
C. Kerberos
D. Single Sign-on (SSO)
Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network?
A. Protocol analyzer
B. WIPS
C. WLAN controller
D. Spectrum analyzer
Which of the following operating systems have Windows Security Health Agent (SHA) on computers and report their status to the Security Health Validator (SHV)? Each correct answer represents a complete solution. Choose three.
A. Windows 2000 Professional
B. Windows Vista Business
C. Windows XP Service Pack 3
D. Windows 7 Professional
What displays a user's level of access to a particular file or folder on the server?
A. The Resultant Set of Policy
B. the object's Advanced Attributes
C. the object's Effective Permissions
D. the client computer's registry