HOTSPOT
You are setting up BitLocker on a new computer.
Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Note: For each correct selection is worth one point.
Hot Area:
The primary purpose of Network Access Protection (NAP) is to prevent:
A. Loss of data from client computers on a network.
B. Non-compliant systems from connecting to a network.
C. Users on a network from installing software.
D. Unauthorized users from accessing a network.
Which password attack uses all possible alpha numeric combinations?
A. Social engineering
B. Brute force attack
C. Dictionary attack
D. Rainbow table attack
You are trying to connect to an FTP server on the Internet from a computer in a school lab. You cannot get a connection. You try on another computer with the same results. The computers in the lab are able to browse the Internet.
You are able to connect to this FTP server from home.
What could be blocking the connection to the server?
A. A layer-2 switch
B. A wireless access point
C. A firewall
D. A layer-2 hub
What does NAT do?
A. It encrypts and authenticates IP packets.
B. It provides caching and reduces network traffic.
C. It translates public IP addresses to private addresses and vice versa.
D. It analyzes incoming and outgoing traffic packets.
E-mail spoofing:
A. Forwards e-mail messages to all contacts
B. Copies e-mail messages sent from a specific user
C. Obscures the true e-mail sender
D. Modifies e-mail routing logs
You are trying to establish communications between a client computer and a server. The server is not responding.
You confirm that both the client and the server have network connectivity.
Which should you check next?
A. Microsoft Update
B. Data Execution Prevention
C. Windows Firewall
D. Active Directory Domains and Trusts
Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following can Mark use to minimize the spam amount that is hitting the Microsoft Exchange server of the company?
A. Enable reverse DNS lookup
B. Use Read-only Domain Controller
C. Add Sender Policy Framework
D. Permit User Account Control
Mark works as a Security Administrator for TechMart Inc. The company has a a Windows-based network. Mark has gone through a security audit for ensuring that the technical system is secure and protected. While this audit, he identified many areas that need improvement. He wants to minimize the risk for potential security threats by educating team members in the area of social engineering, and providing basic security principle knowledge while stressing the Con?dentiality, Integrity, and Availability triangle in the training of his team members . Which of the following ways will Mark use for educating his team members on the social engineering process?
A. He will call a team member while behaving to be someone else for gaining access to sensitive information.
B. He will use group policies to disable the use of floppy drives or USB drives.
C. He will develop a social awareness of security threats within an organization.
D. He will protect against a Distributed Denial of Services attack.
You are trying to enable BitLocker on your father's computer.
What is the purpose of the Trusted Platform Module (TPM) when it is used by BitLocker?
A. to store an encrypted file allocation table for the protected drive
B. to provide a co-processor that encrypts/decrypts data
C. to verify the integrity of the early boot components
D. to store the hashed data produced by BitLocker encryption