HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
Answer :
Humongous Insurance is an online healthcare insurance company. During an annual security audit a security firm tests the strength of the company's password policy and suggests that Humongous Insurance implement password history policy.
What is the likely reason that the security firm suggests this?
Answer : B
The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting it with the WPS PIN.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Answer : A
What are three major attack vectors that a social engineering hacker may use? (Choose three.)
Answer : ABC
Which two security settings can be controlled by using group policy? (Choose two.)
Answer : AB
Reference:
http://technet.microsoft.com/en-us/library/cc875814.aspx
Cookies impact security by enabling: (Choose two.)
Answer : AD
Reference:
http://en.wikipedia.org/wiki/HTTP_cookie
To keep third-party content providers from tracking your movements on the web, enable InPrivate Browsing.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.
Answer : A
Which enables access to all of the logged-in user's capabilities on a computer?
Answer : B
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
Answer :
You need to install a domain controller in a branch office. You also need to secure the information on the domain controller. You will be unable to physically secure the server.
Which should you implement?
Answer : A
Explanation:
A read-only domain controller (RODC) is a new type of domain controller in the Windows Server® 2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read-only partitions of the Active Directory® Domain
Services (AD DS) database.
References:
http://technet.microsoft.com/en-us/library/cc732801(v=ws.10).aspx
E-mail spoofing:
Answer : C
Reference:
http://www.microsoft.com/mscorp/safety/technologies/senderid/technology.mspx
What is the primary advantage of using Active Directory Integrated Zones?
Answer : D
Reference:
http://books.google.com/books?id=CXy-2LBZCVgC&pg=PA201&dq=%22Active+Directory+Integrated+Zones%22,+Secure+replication&hl=en&sa=X&ei=9s92U- v1KI-zyASjzILIDg&ved=0CE0Q6AEwAQ#v=onepage&q=%22Active%20Directory%20Integrated%20Zones%22%2C%20Secure%20replication&f=false
Which two are included in an enterprise antivirus program? (Choose two.)
Answer : BD
Phishing is an attempt to:
Answer : A
Explanation:
Phishing is the act of attempting to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
Humongous Insurance needs to set up a domain controller in a branch office. Unfortunately, the server cannot be sufficiently secured from access by employees in that office, so the company is installing a Primary Domain Controller.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Answer : A