QUESTIONS AND ANSWERS LATEST UPDATE
(ALREADY GRADED A+)
Back Orifice is an example of a backdoor. T/F
True
A group of compromised computers that have software installed by a worm or Trojan is known as
which of the following?
A. Botnet
B. Virus
C. Honeypot
D. Zombie
A. Botnet
Which of the following is an inline device that checks all packets?
A. Host-biased intrusion detection system
B. Statistical anomaly
C. Network intrusion detection system
D. Personal software firewall
A. Host-biased intrusion detection system
By turning on the phishing filter a person can prevent spyware. T/F
True
Ransomware holds a user's files for ransom by encrypting them. T/F
True
Which of the following can help to secure the BIOS of a computer? Select two:
- Use a case lock
- Use a BIOS supervisor password.
- Configure a user password
- Disable USB ports
Use a case lock
Which of the following is the best mode to use when scanning for viruses?
- Safe mode
- Last known good configuration
- Command prompt only
- Boot into Windows normally
, Which of the following methods of malware delivery is used in computer programs to bypass normal
authentication?
- Privilege escalation
- Active interception
- Backdoor
- Rootkit
Which one of the following navigiational paths shows the current service pack level to the user?
- Click start, right-click network, and select properties
- Click start, right click computer, and select properties
- Click start, right click computer, and select manage
- Click start, right click network, and select manage
Click Start, right-click Computer, and select Properties
An IT security technician needs to establish host based security for company workstations. Which of
the following will BEST meet this requirement?
- Implement IIS hardening by restricting service accounts
- Implement database hardening y applying vendor guidelines
- Implement perimeter firewall rules to restrict access
- Implement OS hardening by applying GPOs
Implement OS hardening by applying GPOs
Which of the following should you implement to keep a well-maintained computer?
- Update the firewall
- Update the BIOS
- Use a surge protector
- Remove the unnecessary firewall
Update the BIOS
To open the Local Group Policy console window, a user can only use the MMC in the Run prompt. T/F
False
The convert command converts an NTFS drive to FAT32. T/F
False
The systeminfo commands show a list of hot fixes that have been installed to the operating system.
True
The option Never Click for Updates is recommended by Microsoft. T/F
A service pack is a group of updates, bug fixes, updated drivers, and security fixes. T/F
True