Answers
|
Questions
|
1-
spyware
2-
grayware
|
What
are two examples of malware? (Choose
two.)
|
1-
Enable
WEP.
2-
Enable
MAC filtering
|
Which
two actions improve security on a wireless network? (Choose
two.)
|
Implement lockout rules upon consecutive unsuccessful attempts
at accessing the system.
|
Which
best practice should be included in a password protection
policy?
|
1-
What
items need to be protected?
2-
What
is to be done in the case of a
security breach?
3-
What
are the possible threats to the items?
|
Which
three questions should be addressed
by organizations developing a security policy? (Choose three.)
|
Download the latest signature files on a regular basis
|
What
must be done to ensure that the
antivirus software on a computer is able to detect and eradicate
the most recent viruses?
|
Create
a restore point
|
A
technician has downloaded the latest Windows XP updates from the
Microsoft website. What should the technician do before
installing the updates?
|
The
update will be installed as soon as the computer is powered on
|
A
computer that is configured for
automatic updates is shut down during a scheduled update.
However, the update is downloaded
successfully without any file being corrupted in the process.
What will happen to the update as a result
of this shutdown?
|
guiding
visitors within the premises and escorting them personally when
they leave
|
Which
precaution helps protect against social engineering in the
workplace?
|
spam
|
A large
number of e-mail messages are appearing in the inbox of a home
computer user. The messages relate to products for which the
user has never requested information. Which name
is given to this type of e-mail?
|
replay
|
A
company network was subjected to
several security attacks after TCP/IP had been installed on the
company computers. Analysis has shown that in most of the
attacks, attackers used network sniffers
to extract user names and passwords of critical accounts on the
network. Which type of TCP/IP attack did these attackers deploy?
|
by
installing unwanted programs on a computer
|
How
can web tools, such as Java or ActiveX, be
used for a malicious attack?
|
a
biometric sensor
|
Which
security device stores user physical characteristics to provide
a user level of facility access?
|
poor
wireless device security
|
What
condition can allow unauthorized access to a network for users
who are not physically connected to
the network?
|
because
everyone can be affected by computer and network security
problems
|
Why
should everyone in an organization give high priority to
computer and network security?
|
1-
keep
equipment functioning
2-
provide access only to authorized users
|
What
are two important outcomes of good computer and network
security? (Choose two.)
|
a
programming code pattern
|
What is
a signature as
the term is used in antivirus and
antispyware software development?
|
2.5.4.3.6.1
|
Refer
to the exhibit. What is the correct order for the steps in the
troubleshooting process?
|
1-
What
problems are you experiencing?
2-
What
websites have you visited recently?
|
Which
two questions are examples of open-ended questions that
could be used in the security
troubleshooting process? (Choose two.)
|
Establish a plan of action for resolution.
|
For
troubleshooting security problems, what
should be done immediately after the exact cause of the
problem is determined?
|
Identify the problem
|
At
which step of the troubleshooting process will a computer
technician ask the customer a series of open-ended and
closed-ended questions?
|
0 komentar:
Posting Komentar