Security Fundamentals Microsoft
Security Fundamentals Microsoft
123q
Version 17.0
98-367
QUESTION 1
Windows Firewall is a built-in. host-based, stateless firewall.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is
needed" if the underlined text makes the statement correct.
Stateful
Network layer
Packet filter
No change is needed
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Bridging is a process of sending packets from source to destination on OSI layer 3.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is
needed" if the underlined text makes the statement correct.
Routing
Switching
Repeating
No change is needed.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
The primary purpose of Network Access Protection (NAP) is to prevent:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
NAP enforces health policies by inspecting and assessing the health of client computers, restricting
network access when client computers are noncompliant with health policy, and remediating noncompliant
client computers to bring them into compliance with health policy before they are granted full network
access. NAP enforces health policies on client computers that are attempting to connect to a network; NAP
also provides ongoing health compliance enforcement while a client computer is connected to a network.
Reference: http://technet.microsoft.com/en-us/library/cc754378(v=ws.10).aspx
QUESTION 4
You want to make your computer resistant to online hackers and malicious software.
What should you do?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
Your company requires that users type a series of characters to access the wireless network.
WEP
WPA2 PSK
WPA2 Enterprise
MAC filtering
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation: Pre-shared key mode (PSK, also known as Personal mode) is designed for home and small
office networks that don't require the complexity of an 802.1X authentication server. [9] Each wireless
network device encrypts the network traffic using a 256 bit key. This key may be entered either as a string
of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters
QUESTION 6
Many Internet sites that you visit require a user name and password.
How should you secure these passwords?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Physically securing servers prevents:
Theft
Compromise of the certificate chain
Man-in-the middle attacks
Denial of Service attacks
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
To prevent users from copying data to removable media, you should:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: http://blogs.technet.com/b/askds/archive/2008/08/25/removable-storage-group- policy-
andwindows-server-2008-and-windows-vista.aspx
QUESTION 9
You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are
members of an Active Domain.
You need to push out an internal certificate to Internet Explorer on all workstations.
Local policy
Logon script
Windows Update
Group policy
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
In Internet Explorer 8, the InPrivate Browsing feature prevents:
Explanation/Reference:
Reference: http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing
QUESTION 11
The purpose of a digital certificate is to verify that a:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an
electronic document that uses a digital signature to bind a public key with an identity.
QUESTION 12
A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is
needed" if the underlined text makes the statement correct.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
You are volunteering at an organization that gets a brand new web server. To make the server more
secure, you should add a second administrator account.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is
needed" if the underlined text makes the statement correct.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
The Windows Firewall protects computers from unauthorized network connections.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is
needed'' if the underlined text makes the statement correct.
Email viruses
Phishing scams
Unencrypted network access
No change is needed
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho
already has servers for their business and would like to avoid purchasing a new one.
Which server is best to use as a web server, considering the security and performance concerns?
SQL Server
File Server
Domain Controller
Application Server
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
A user who receives a large number of emails selling prescription medicine is probably receiving pharming
mail.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is
needed" if the underlined text makes the statement correct.
Malware
Spoofed mail
Spam
No change is needed.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
The client computers on your network are stable and do not need any new features.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
Which password attack uses all possible alpha numeric combinations?
Social engineering
Brute force attack
Dictionary attack
Rainbow table attack
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
A digitally signed e-mail message:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
C.
D.
By digitally signing a message, you apply your unique digital mark to the message. The digital signature
includes your certificate and public key. This information proves to the recipient that you signed the
contents of the message and not an imposter, and that the contents have not been altered in transit.
Reference: http://office.microsoft.com/en-us/outlook-help/secure-messages-with-a-digital-
signatureHP001230539.aspx
QUESTION 21
Passwords that contain recognizable words are vulnerable to a:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A dictionary attack is a method of breaking into a password-protected computer or server by systematically
entering every word in a dictionary as a password. A dictionary attack can also be used in an attempt to
find the key necessary to decrypt an encrypted message or document.
Dictionary attacks work because many computer users and businesses insist on using ordinary words as
passwords. Dictionary attacks are rarely successful against systems that employ multiple-word phrases,
and unsuccessful against systems that employ random combinations of uppercase and lowercase letters
mixed up with numerals. Reference: http://searchsecurity.techtarget.com/definition/dictionary-attack
QUESTION 22
Account lockout policies are used to prevent which type of security attack?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
What is the standard or basic collection of NTFS permissions?
Read and execute, read, write, full control, modify, list folder contents
Change permissions, read permissions, write permissions
Read attributes, list folder/read data, traverse folder/execute file
Create files/write data, create folders/append data, take ownership
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: http://technet.microsoft.com/en-us/library/bb727008.aspx
QUESTION 24
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
Which enables you to change the permissions on a folder?
Take ownership
Extended attributes
Auditing
Modify
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
A group of users has access to Folder A and all of its contents. You need to prevent some of the users
from accessing a subfolder inside Folder A.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
What are three examples of two-factor authentication? (Choose three.)
C.
D.
Explanation/Reference:
Explanation:
At minimum two-factor authentication requires two out of three regulatory-approved authentication
variables such as:
Something you know (like the PIN on your bank card or email password).
Something you have (the physical bank card or a authenticator token).
Something you are (biometrics like your finger print or iris pattern).
QUESTION 28
You need to limit the programs that can run on client computers to a specific list.
Which technology should you implement?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
The purpose of User Account Control (UAC) is to:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's
Windows machines. It aims to improve the security of Microsoft Windows by limiting application software to
standard user privileges until an administrator authorizes an increase or elevation. In this way, only
applications trusted by the user may receive administrative privileges, and malware should be kept from
compromising the operating system.
QUESTION 30
What does implementing Windows Server Update Services (WSUS) allow a company to manage?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
The purpose of Microsoft Baseline Security Analyzer is to:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
The Graphic Design Institute hires you to help them set up a server for their 20-person team. As a
general practice of hardening the server, you start by performing which two tasks? (Choose two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
What are two attributes that an email message may contain that should cause a user to question whether
the message is a phishing attempt? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Reference: http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
QUESTION 34
Keeping a server updated:
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
Before you deploy Network Access Protection (NAP), you must install:
Internet Information Server (IIS)
Network Policy Server (NPS)
Active Directory Federation Services
Windows Update Service
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: http://technet.microsoft.com/en-us/library/bb681008.aspx
QUESTION 36
What is a common method for password collection?
Email attachments
Back door intrusions
SQL Injection
Network sniffers
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
Which provides the highest level of security in a firewall?
Stateful inspection
Outbound packet filters
Stateless inspection
Inbound packet filters
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
The primary method of authentication in an SSL connection is passwords.
To answer, choose the option "No change is needed" if the underlined text is correct. If the underlined text
is not correct, choose the correct answer.
No change is needed
Certificates
IPsec
Biometrics
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.geocerts.com/ssl/understanding_authentication
QUESTION 39
You are setting up Remote Desktop on your computer. Your computer is a member of a domain.
You need to allow Remote Desktop to be able to get through your firewall for users on your company's
network.
Explanation/Reference:
QUESTION 40
You are trying to connect to an FTP server on the Internet from a computer in a school lab. You cannot get
a connection. You try on another computer with the same results. The computers in the lab are able to
browse the Internet.
A layer-2 switch
A wireless access point
A firewall
A layer-2 hub
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
What does NAT do?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: http://en.wikipedia.org/wiki/Network_address_translation
QUESTION 42
The default password length for a Windows Server domain controller is:
0
5
7
14
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43
You create a web server for your school. When users visit your site, they get a certificate error that says
your site is not trusted.
What should you do to fix this problem?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
What is an example of non-propagating malicious code?
A back door
A hoax
A Trojan horse
A worm
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45
A brute force attack:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 46
Humongous Insurance is an online healthcare insurance company. During an annual security audit a
security firm tests the strength of the company's password policy and suggests that Humongous Insurance
implement password history policy.
What is the likely reason that the security firm suggests this?
QUESTION 47
The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting it with the WPS
PIN.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is
needed" if the underlined text makes the statement correct.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
What are three major attack vectors that a social engineering hacker may use? (Choose three.)
Telephone
Reverse social engineering
Waste management
Honey pot systemsE. Firewall interface
Explanation/Reference:
QUESTION 49
Which two security settings can be controlled by using group policy? (Choose two.)
Password complexity
Access to the Run... command
Automatic file locking
Encrypted access from a smart phone
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Reference: http://technet.microsoft.com/en-us/library/cc875814.aspx
QUESTION 50
Cookies impact security by enabling: (Choose two.)
Storage of Web site passwords.
Higher security Web site protections.
Secure Sockets Layer (SSL).
Web sites to track browsing habits.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Reference: http://en.wikipedia.org/wiki/HTTP_cookie
QUESTION 51
To keep third-party content
providers from tracking your
movements on the web,
enable InPrivate Browsing.
Select the correct answer if
the underlined text does not
make the statement correct.
Select "No change is
needed'' if the underlined
text makes the statement
correct.
InPrivate Filtering
SmartScreen Filter
Compatibility Mode
No change is needed
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52
Which enables access to all of the logged-in user's capabilities on a computer?
Java applets
ActiveX controls
Active Server Pages (ASP)
Microsoft Silverlight
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
You need to install a domain controller in a branch office. You also need to secure the information on the
domain controller. You will be unable to physically secure the server.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A read-only domain controller (RODC) is a new type of domain controller in the Windows Server® 2008
operating system. With an RODC, organizations can easily deploy a domain controller in locations where
physical security cannot be guaranteed. An RODC hosts read-only partitions of the Active Directory®
Domain Services (AD DS) database. Explanation: http://technet.microsoft.com/en-us/library/cc732801
(v=ws.10).aspx
QUESTION 54
E-mail spoofing:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: http://www.microsoft.com/mscorp/safety/technologies/senderid/technology.mspx
QUESTION 55
What is the primary advantage of using Active Directory Integrated Zones?
Zone encryption
Password protection
Non-repudiation
Secure replication
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: http://books.google.com/books?id=CXy-2LBZCVgC&pg=PA201&dq= %22Active+Directory
+Integrated+Zones%22,+Secure+replication&hl=en&sa=X&ei=9s92U- v1KI-
zyASjzILIDg&ved=0CE0Q6AEwAQ#v=onepage&q=%22Active%20Directory %20Integrated%20Zones%
22%2C%20Secure%20replication&f=false
QUESTION 56
Which two are included in an enterprise antivirus program? (Choose two.)
Explanation/Reference:
QUESTION 57
Phishing is an attempt to:
Explanation/Reference:
Explanation:
Phishing is the act of attempting to acquire sensitive information such as usernames, passwords, and credit
card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic
communication.
QUESTION 58
Humongous Insurance needs to set up a domain controller in a branch office. Unfortunately, the server
cannot be sufficiently secured from access by employees in that office, so the company is installing a
Primary Domain Controller.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is
needed" if the underlined text makes the statement correct.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59
Where should you lock up the backup tapes for your servers?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Backup tapes should be stored off site, preferably in a fire safe, so that the data is available should a fire,
flood, or other disaster affect the location were the servers are.
QUESTION 60
Which is a special folder permission?
Read
Modify
Write
Delete
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: http://support.microsoft.com/kb/308419
QUESTION 61
When conducting a security audit the first step is to:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 62
You are an intern at Litware, Inc. Your manager asks you to make password guess attempts harder by
limiting login attempts on company computers.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: http://technet.microsoft.com/en-us/library/dd277400.aspx
QUESTION 63
You need to grant a set of users write access to a file on a network share. You should add the users to:
A security group
The Authenticated Users group
The Everyone group
A distribution group
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 64
The certificate of a secure public Web server on the Internet should be:
Explanation/Reference:
QUESTION 65
Setting a minimum password age restricts when users can:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Configure the minimum password age to be more than 0 if you want Enforce password history to be
effective. Without a minimum password age, users can cycle through passwords repeatedly until they get
to an old favorite.
QUESTION 66
Basic security questions used to reset a password are susceptible to:
Hashing
Social engineering
Network sniffingD. Trojan horses
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: http://en.wikipedia.org/wiki/Self-service_password_reset
QUESTION 67
You suspect a user's computer is infected by a virus.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 68
You create a new file in a folder that has inheritance enabled.
By default, the new file:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en- us/
acl_inherit_permissions.mspx?mfr=true
QUESTION 69
Password history policies are used to prevent:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
This security setting determines the number of unique new passwords that have to be associated with a
user account before an old password can be reused. The value must be between 0 and 24 passwords.
This policy enables administrators to enhance security by ensuring that old passwords are not reused
continually.
Reference: http://technet.microsoft.com/en-us/library/cc758950(v=ws.10).aspx
QUESTION 70
The Active Directory controls, enforces, and assigns security policies and access rights for all users.
Select the correct answer if the underlined text does not make the statement correct. Select "No change
is needed" if the underlined text makes the statement correct.
NTFS permissions
User Account Control
Registry
No change is needed
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 71
Creating MD5 hash for files is an example of ensuring what?
Confidentiality
Availability
Least privilege
Integrity
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit
(16byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been
utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity.
QUESTION 72
Which three elements does HTTPS encrypt? (Choose three.)
Browser cookies
Server IP address
Port numbers
Website URL
Login information
Explanation/Reference:
Reference: http://stackoverflow.com/questions/499591/are-https-urls-encrypted
QUESTION 73
The company that you work for wants to set up a secure network, but they do not have any servers.
Which three security methods require the use of a server? (Choose three.)
802.1x
WPA2 Personal
WPA2 Enterprise
RADIUS
802.11ac
Explanation/Reference:
QUESTION 74
Shredding documents helps prevent:
Man-in-the-middle attacks
Social engineering
File corruption
Remote code execution
Social networking
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: http://technet.microsoft.com/en-us/library/cc875841.aspx
QUESTION 75
Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer
network.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is
needed" if the underlined text makes the statement correct.
Phishing
Malware
Reverse Social engineering
No change is needed
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 76
An attorney hires you to increase the wireless network security for the law firm's office. The office has a
very basic network, with just a modem and a router.
WPA-Personal
WEP
WPA2-Personal
WPA-Enterprise
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 77
Which type of firewall allows for inspection of all characteristics of a packet?
NAT
Stateful
Stateless
Windows Defender
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: http://en.wikipedia.org/wiki/Stateful_firewall
QUESTION 78
You are trying to establish communications between a client computer and a server. The server is not
responding.
You confirm that both the client and the server have network connectivity.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 79
You are an intern and are working remotely.
What are two connection methods you could use? (Choose two.)
Forward Proxy
Virtual Private Network (VPN)
Remote Access Service (RAS)
Roaming Profiles
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 80
Network Access Protection (NAP) enables administrators to control access to network resources based on
a computer's:
Encryption level
Warranty
Physical location
Configuration
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Network Access Protection (NAP) is a new set of operating system components included with the
Windows Server® 2008 and Windows Vista® operating systems that provides a platform to help ensure
that client computers on a private network meet administrator-defined requirements for system health.
NAP policies define the required configuration and update status for a client computer's operating system
and critical software. For example, computers might be required to have antivirus software with the latest
signatures installed, current operating system updates installed, and a host-based firewall enabled. By
enforcing compliance with health requirements, NAP can help network administrators mitigate some of the
risk caused by improperly configured client computers that might be exposed to viruses and other
malicious software.
A.
QUESTION 81
Which technology enables you to filter communications between a program and the Internet?
RADIUS server
Antivirus software
Software firewall
BitLocker To Go
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
There are two types of firewalls the Hardware Firewall and the Software Firewall. A Software Firewall is a
software program and a Hardware Firewall is a piece of hardware. Both have the same objective of
filtering communications over a system.
QUESTION 82
This question requires that you evaluate the underlined text to determine if it is correct. The first line of
defense against attacks from the Internet is a software firewall.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is
needed'' if the underlined text makes the statement correct.
hardware firewall
virus software
radius server
No change is needed
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 83
Which attack listens to network traffic of a computer resource?
Resource gathering
Denial of service
ARP poisoning
Eavesdropping
Logic bomb
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Eavesdropping
In general, the majority of network communications occur in an unsecured or "cleartext" format, which
allows an attacker who has gained access to data paths in your network to "listen in" or interpret (read) the
traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or
snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem
A.
that administrators face in an enterprise. Without strong encryption services that are based on
cryptography, your data can be read by others as it traverses the network.
QUESTION 84
Which of the following describes a VLAN?
It connects multiple networks and routes data packets.
It is a logical broadcast domain across physical subnets.
It is a subnetwork that reveals a company's externally facing resources to the public network.
It allows different network protocols to communicate between different network segments.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
VLAN (Virtual Local Network) is a logically separate IP subnetwork which allow multiple IP networks and
subnets to exist on the same-switched network. VLAN is a logical broadcast domain that can span
multiple physical LAN segments. It is a modern way administrators configure switches into virtual local-
area networks (VLANs) to improve network performance by separating large Layer 2 broadcast domains
into smaller ones.
QUESTION 85
A network sniffer is software or hardware that:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A network sniffer is a computer tool that captures network data in the form of low-level packets. Network
sniffers can be used for technical troubleshooting and analyzing the communication.
QUESTION 86
What is a service set identifier (SSID)?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
SSID (service set identifier) is a function performed by an Access Point that transmits its name so that
wireless stations searching for a network connection can 'discover' it. It's what allows your wireless
A.
adapter's client manager program or Windows built-in wireless software to give you a list of the Access
Points in range.
QUESTION 87
To implement WPA2 Enterprise, you would need a/an:
RADIUS server
SSL server
WEP server
VPN server
A.
Correct Answer: A
Section: (none) Explanation
Explanation/Reference:
QUESTION 88
You would implement a wireless intrusion prevention system to:
Correct Answer: C
Section: (none) Explanation
Explanation/Reference:
Reference: http://en.wikipedia.org/wiki/Wireless_intrusion_prevention_system
QUESTION 89
The manager of a coffee shop hires you to securely set up WiFi in the shop.
To keep computer users from seeing each other, what should you use with an access point?
Correct Answer: B
Section: (none) Explanation
Explanation/Reference:
Explanation:
Wireless Client Isolation is a unique security feature for wireless networks. When Client Isolation is enabled any and all
devices connected to the wireless LAN will be unable to talk to each other.
QUESTION 90
E-mail bombing attacks a specific entity by:
Correct Answer: B
Section: (none) Explanation
Explanation/Reference:
Explanation:
In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an
attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack.
QUESTION 91
How does the sender policy framework (SPF) aim to reduce spoofed email?
A.
It provides a list of IP address ranges for particular domains so senders can be verified.
It includes an XML policy file with each email that confirms the validity of the message.
It lists servers that may legitimately forward mail for a particular domain.
It provides an encryption key so that authenticity of an email message can be validated
Correct Answer: A
Section: (none) Explanation
Explanation/Reference:
QUESTION 92
Windows Server Update Services (WSUS) is a tool that:
Correct Answer: D
Section: (none) Explanation
Explanation/Reference:
Explanation:
Windows Server Update Services (WSUS) enables information technology administrators to deploy the latest Microsoft
product updates to computers that are running the Windows operating system. By using WSUS, administrators can fully
manage the distribution of updates that are released through Microsoft Update to computers in their network. Reference:
http://technet.microsoft.com/en-us/windowsserver/ bb332157.aspx
QUESTION 93
Which two characteristics should you recommend for a user's domain password? (Choose two.)
Hard to guess
Includes Unicode characters
Easy to remember
Easy to increment
Correct Answer: AC
Section: (none) Explanation
Explanation/Reference:
Reference: http://www.usewisdom.com/computer/passwords.html
QUESTION 94
To protect systems from buffer overflow errors, you can use:
Antivirus software
Data Execution Prevention
A proxy server
An Intruder Prevention System
Correct Answer: B
Section: (none) Explanation
A.
Explanation/Reference:
QUESTION 95
You sign up for an online bank account. Every 6 months, the bank requires you to change your password. You have
changed your password 5 times in the past. Instead of coming up with a new password, you decide to use one of your
past passwords, but the bank's password history prevents you on doing so.
Select the correct answer if the underlined text does not make the statement correct Select "No change is needed" if the
underlined text makes the statement correct.
Correct Answer: D
Section: (none) Explanation
Explanation/Reference:
QUESTION 96
You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is
stolen.
File-level permissions
Advanced Encryption Standard (AES)
Folder-level permissions
Distributed File System (DFS)
BitLocker
Correct Answer: E
Section: (none) Explanation
Explanation/Reference:
Reference: http://4sysops.com/archives/seven-reasons-why-you-need-bitlocker-hard-drive- encryption-foryour-whole-
organization/
QUESTION 97
Your password is 1Vu*cI!8sT.
Rainbow table
Brute force
Spidering
Dictionary
Correct Answer: A
Section: (none) Explanation
Explanation/Reference:
A.
QUESTION 98
You have a Windows 7 desktop computer, and you create a Standard User account for your roommate so that he can
use the desktop from time to time. Your roommate has forgotten his password.
Which two actions can you take to reset the password? (Choose two.)
Correct Answer: AB
Section: (none) Explanation
Explanation/Reference:
QUESTION 99
You have two servers that run Windows Server. All drives on both servers are formatted by using NTFS.
You move a file from one server to the other server. The file's permissions in the new location will:
Correct Answer: C
Section: (none) Explanation
Explanation/Reference:
Explanation:
You can modify how Windows Explorer handles permissions when objects are copied or moved to another NTFS
volume. When you copy or move an object to another volume, the object inherits the permissions of its new folder.
QUESTION 100
Alice sends her password to the game server in plaintext. Chuck is able to observe her password
as shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each
correct selection is worth one point.
A.
Hot Area:
Correct Answer:
Explanation/Reference:
QUESTION 101
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
A.
Hot Area:
Correct Answer:
Explanation/Reference:
QUESTION 102
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 103
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 104
You are an intern for a company where your manager wants to be sure you understand the social
engineering threats that may occur. Your manager emphasizes the principles of the Microsoft
Defense-in-Depth Security Model shown in the following image:
A.
Use the drop-down menus to select the answer choice that completes each statement. Each
correct selection is worth one point.
Hot Area:
Correct Answer:
A.
Explanation/Reference:
QUESTION 105
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
Correct Answer:
A.
Explanation/Reference:
QUESTION 106
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
Correct Answer:
A.
Explanation/Reference:
QUESTION 107
You are preparing a local audit policy for your workstation. No auditing is enabled. The settings
Use the drop-down menus to select the answer choice that completes each statement. Each
correct selection is worth one point.
Hot Area:
Correct Answer:
A.
Explanation/Reference: Explanation:
Dozens of events can be audited in Windows. The events fall into several categories:
Audit account logon events - audit each instance of a user logging on to or logging off from
another computer in which this computer is used to validate the account. This event
category is applicable to domain controllers only since DC’s are used to validate accounts in
domains.
Audit account management - audit each event of account management on a computer.
Examples of account maintenance include password changes, user account and group
modifications.
Audit directory service access - audit the event of a user accessing an Active Directory object
that has its own system access control list (SACL) specified.
Audit logon events - audit each instance of a user logging on to or logging off from a
computer. Note that this is different than the ‘Audit account login events’ category. This
tracks the logon event to a specific server. The former tracks which domain controller
authenticated the user.
Audit object access - audit the event of a user accessing an object that has its own system
access control list (SACL) specified. Examples of objects are files, folders, registry keys,
printers, etc.
Audit policy change - audit every incident of a change to user rights assignment policies, audit
policies, or trust policies.
Audit privilege use - audit each instance of a user exercising a user right.
Audit process tracking - audit detailed tracking information for events such as program
activation, process exit, handle duplication, and indirect object access.
Audit system events - audit when a user restarts or shuts down the computer or when an
event occurs that affects either the system security or the security log. Reference:
http://www.petri.co.il/windows_auditing.htm
QUESTION 108
You are at school and logged in to a Windows 7 computer using a standard user account.
You need to change some of the properties of a desktop icon for an assignment. Your instructor
A.
provides you with an administrator username and password and asks you to do two tasks.
When you open the Need Admin Access Properties window, you see the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each
correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 109
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference: Explanation:
Biometric devices, such as finger scanners consist of a reader or scanning device, Software that
converts the scanned information into digital form and compares match points, and a database
that stores the biometric data for comparison. To prevent identity theft, biometric data is usually
encrypted when it is gathered.
QUESTION 110
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
Correct Answer:
A.
Explanation/Reference:
QUESTION 111
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
Correct Answer:
A.
Explanation/Reference:
QUESTION 112
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
Correct Answer:
A.
Explanation/Reference:
QUESTION 113
Your supervisor asks you to review file permission settings on the application.bat file.
You need to report which file system the file is on and the type of permission the file has. You
review the application Properties dialog box shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each
correct selection is worth one point.
A.
Hot Area:
Correct Answer:
Explanation/Reference:
QUESTION 114
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 115
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 116
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 117
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 118
You are preparing an audit policy for the workstations at Contoso, Ltd. Currently, no advanced
auditing is enabled. The workstations are not members of the domain.
The settings of your Advanced Audit Policy Configuration are shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each
A.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 119
An employee where you work is unable to access the company message board in Internet
Explorer.
You review her Internet Options dialog box, as shown in the following image:
A.
Use the drop-down menus to select the answer choice that completes each statement. Each
correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 120
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 121
Alice and Bob are exchanging messages with each other. Chuck modifies the messages sent
between Alice and Bob as shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each
correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference: Explanation:
The usual way to prevent the man-in-the-middle attack is to use a public key cryptosystem
capable of providing digital signatures. For set up, the parties must know each others public keys
in advance. After the shared secret has been generated, the parties send digital signatures of it to
each other. The man-in-the-middle can attempt to forge these signatures, but fails because
he cannot fake the signatures.
QUESTION 122
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Explanation/Reference:
QUESTION 123
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Hot Area:
A.
Correct Answer:
Practice Set A
Que1: You have an application that uses IPsec to secure communication between an Internet client and
a server on the internal network
A) Radius
B) VPN
C) SSH
D) SFTP
A) Multifactor authentication
B) Network encryption
c) Robust passwords
D) External authentication.
Que3:- The manager of a coffee shop hires you to securely set up WiFi in the shop. You want to allow only
a certain list of computers to access the network. What should you use with an access point?
Que4: Installing a system file checksum verification application on your servers is an example of ensuring:
A) Confidentiality.
B) Availability.
A.
c) Accessibility.
D) Integrity.
A) Malware.
B) Missing firmware updates.
C) Missing security updates.
D) System errors.
Que7: The reason for implementing Service Set IDentifier (SSID) masking is to:
B) Disable autologon.
Que8: You have a new computer and want to restrict other people from replacing the operating system.
Which action prevents a user from installing an alternate operating system by using physical media if
the user has physical access to the computer?
A) Password protecting the computer BIOS
B) Disabling removable devices and drives
C) Installing drive-level encryption
D) Removing the user from the administrators group
Que9: You are using the Microsoft Edge browser to connect to a web server that hosts a test version of
a web application. You receive the following message:
This might mean that someone's trying to fool you or steal any info you send to the server. You should close
this site immediately.
Go to my homepage instead
X Continue to this webpage (not recommended)
A.
Instructions: Use the drop-down menus to select the answer choice that completes each statement based
on the information presented in the graphic.
A) This error message may be generated if the web server is configured to use a [answer choice] for TLS.
B) Purchasing a [answer choice] for the server and configuring the server to use it will most likely cause the
issue to resolve itself.
Que10: You receive an email that appears to be from your help desk. The email tells you that your
account has a problem. The email asks you to provide your account's usernaame and password in order to
fix the problem. What is this an example of?
A) Attack surface
B) Confidentiality
C) Demilitarized zone
D) Social engineering
Que13: What enables an employee to connect securely to a corporate network by using the Internet?
Que14: Your anti-spam program is blocking emails from a particular sender. Your company needs to
receive emails from this sender. What should you do?
A.
Que15: You need to give a standard user permission to run a program as an administrator. How should
you set up the program shortcut to accomplish this?
A) In a different Compatibility Mode
B) By using a smart card
C) In a separate memory space
D) By utilizing RunAs
Que16: This question requires that you evaluate the underlined text to determine if it is correct.
Following the principle of least privilege and using the Microsoft Passport feature of Windows 10 can
significantly mitigate the risks from malicious software.
Instructions: Review the underlined text. If it makes the statement correct, select No change is needed." If
the statement is incorrect, select the answer choice that makes the statement correct.
A) User Account Control
B) Credential Guard
C) Kerberos
D) No change is needed.
Que17: You are trying to enable BitLocker on your father's computer.
What is the purpose of the Trusted Platform Module (TPM) when it is used by BitLocker
A) To store the hashed data produced by BitLocker encryption
B) To store an encrypted file allocation table for the protected drive
C) To provide a co-processor that encrypts/decrypts data
D) To verify the integrity of the early boot components
Que18: You are setting up file sharing for your project team.
Instructions: For each of the following statements. select Yes if the statement is true.
Otherwise, select No. Note: Each correct selection is worth one point.
A) NTFS permissions override Share permissions.
B) Share permissions can be used with FAT32 file systems.
C) To configure access to a Public folder, Microsoft
D) Recommends granting 'Change- Share permissions
and "Modify" NTFS permissions to the Users group.
Que19: Self-propagating malicious code is referred to as a:
A) back door.
B) Trojan horse
C) worm.
D) Hoax
A) File corruption.
B) Spyware distribution.
C) Denial of Service attacks.
A.
D) Replay attacks.
Que22: This question requires that you evaluate the underlined text to determine if it is correct. Signing in
using a complex password and a pass-phrase is an example of two-factor authentication. Instructions:
Review the underlined text. If it makes the statement correct, select No change is needed." If the
statement is incorrect, select the answer choice that makes the statement correct.
C) No change is needed.
Que26: Which two optional security measures provide additional multi-factor authentication for
systems secured with BitLocker? (Choose two.)
A) USB flash drive key
B) PIN
A.
C) password
D) fingerprint
Que28: You manage 50 Windows workstations in a computer lab. All workstations belong to the lab Active
Directory domain. You need to implement several audit policies on each workstation in the shortest time
possible.
What should you do?
A) Turn on the Audit Policy on the domain controller.
B) Create a domain Group Policy.
C) Enable Audit object access.
D) Enable logging on each computer
Que29: You are a network administrator. All computers run Internet Explorer 11. You need to protect
users from phishing. What should you enforce?
A) Cross-Site Scripting Filter
B) SmartScreen Filter
C) InPrivate Browsing
D) Antivirus protection
Que30: You receive a phone call. The caller tells you that your Internet Service Provider account has a
problem. The caller asks you to provide your account's user name and password in order to fix the
problem. This is an example of
A) social engineering.
B) password spoofing.
C) social networking.
D) best practices
Que31: You are setting up a standard user account. Using the principle of least privilege, which task should
you prevent the user from performing?
A) Install software.
B) Access the Intranet
C) Send an email message.
D) Access public folders
Que33: What should you do to prevent users from copying data to removable media?
A) Disable copy and paste.
A.
Que34: This question requires that you evaluate the underlined text to determine if it is correct. To
keep third-party content providers from tracking your movements on the web, enable InPrivate
Browsing. Instructions: Review the underlined text. If it makes the statement correct, select No change
is needed." if the statement is incorrect, select the answer choice that makes the statement correct.
A) No change is needed.
B) Tracking Protection
C) SmartScreen Filter
D) Compatibility Mode
Que34: Which type of malicious software is used to steal passwords typed into a computer?
A) backdoor
B) EICAR
C) keylogger
D) ransomware
Que35: You are configuring the network settings of computers in your school's computer lab. Instructions:
For each of the following statements. select Yes if the statement is true. Otherwise, select No. Note: Each
correct selection is worth one point
A) Securing network communication through IPsec packet signing ensures data integrity while in transit.
B) IPsec packet encryption ensures that the data is invulnerable to eavesdropping attacks.
C) Most websites use IPsec to secure communications between their web servers and client web browsers
Que36: Which technology examines packet header information to determine if network traffic is allowed
to enter the internal network?
A) dedicated firewall
B) BitLocker To Go
C) antivirus software
D) RADIUS server
Que37: You have an application that uses IPsec to secure communications between an Internet client and
a server on the internal network.
To which network security service must the IPsec client connect?
A) SFTP
B) SSH
C) RADIUS
D) VPN
Que38: The process of creating a barrier between domain members and non-domain members by using
IPsec policies is referred to as:
A) server isolation.
A.
B) domain filtering.
C) server filtering.
D) domain isolation.
A.
Que39: Transmitting passwords in clear text leaves them vulnerable to interception by a /an:
A) Kerberos client.
B) rogue DHCP server.
C) IPsec decoder.
D)packet sniffer.
Que41: You want to prevent external users from acquiring information about your network. You
should implement a:
A) router.
B) firewall.
C) layer-3 switch.
D) proxy server.
Que42: A process by which DNS zone data is obtained by an attacker is referred to as:
A) Denial of Service.
B) spoofing.
C) phishing.
D) footprinting.
Que44: You need to grant a server administrator full privileges to a server in the domain by using the
administrator's own domain user account. This account does not have administrative privileges to the
domain. Which two objects should you use? (Choose two.)
A) Local Security Policy
B) Local Group
C) Domain User
D) Local User
A.
Practice Set B
Your company maintains a Web server that is accessible to the public. It should be placed in a/an:
B. enterprise domain.
C. perimeter network.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which enables an employee to connect securely to a corporate network by using the Internet?
Correct Answer: A
A.
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
You are trying to establish communications between a client computer and server. The server is
not responding. You confirm that both the client and the server have network connectivity.
B. Microsoft Update
D. Windows Firewall
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
You have an application that communicates by using plain text. You want to secure
communcations between
A. IPSec
B. SFTP
C. TLS
D. SSH
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
A.
QUESTION 6
Which technology enables you to filter communications between a program and the Internet?
A. Antivirus software
A.
B. BitLocker To Go
C. RADIUS Server
D. Software firewall
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
B. man-in-the-middle
C. network sniffer.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
A.
Which three file system objects can you specify the NTFS permissions for? (Choose three.)
http://www.gratisexam.com/
A. Parents
A.
B. Folders
C. Extensions
D. Files
E. Subfolders
Correct Answer:
BDE Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
You need to prevent unauthorized users from reading a specific file on a protable computer if the
portable
computer is stolen.
C. File-level permissions
E. BitLocker
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
A. social engineering.
B. hashing.
C. network sniffing.
A.
D. Trojan horses.
Correct Answer: A
Section: (none)
Explanation
A.
Explanation/Reference:
QUESTION 12
Which displays a user's level of access to a particular file or folder on the server?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
C. authenticate users.
Correct Answer: C
A.
Section: (none)
Explanation
Explanation/Reference:
A.
QUESTION 15
A group of users has access to Folder A and all of its contents. You need to prevent some of the users
from
C. Block inheritance
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
How can you confirm whether a computer on your network is the target of a brute force attack?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
The default password length for a Windows Server domain controller is:
A. 0.
B. 5.
C. 7.
D. 14.
A.
Correct Answer: C
Section: (none)
Explanation
A.
Explanation/Reference:
QUESTION 18
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
Software designed to infiltrate or damage a computer without the user's consent is referred to as:
A. embedded.
B. freeware.
C. malware
D. unsigned.
Correct Answer:
C Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
A. Object access
B. Process tracking
C. Directory services
D. Logon events
Correct Answer:
A.
A Section: (none)
Explanation
A.
Explanation/Reference:
QUESTION 21
Many Internet sites that you visit require a user name and password.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
The services or programs within a computer system that can be exploited by unauthorized users is
referred to
as the:
E) default access.
F) hazard zone.
G) untrusted area.
H) attack surface.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
You receive a phone call. The caller tells you that your Internet Service Provider account has
a problem. The
caller asks you to provide you account's user name and password in order to fix the problem.
A.
C) social engineering.
D) password spoofing.
E) best practices.
A.
D. social networking.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
QUESTION 1
Windows Firewall is a built-in. host-based, stateless firewall.
Select the correct answer if the underlined text does not make the statement correct. Select "No change
is needed" if the underlined text makes the statement correct.
B) Stateful
C) Network layer
D) Packet filter
E) No change is needed
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 2
Bridging is a process of sending packets from source to destination on OSI layer 3.
Select the correct answer if the underlined text does not make the statement correct. Select "No change
is needed" if the underlined text makes the statement correct.
E) Routing
F) Switching
G) Repeating
H) No change is needed.
Correct Answer: A
Explanation
Explanation/Reference:
A.
QUESTION 3
The primary purpose of Network Access Protection (NAP) is to prevent:
Correct Answer: B
Explanation
Explanation/Reference:
Explanation:
NAP enforces health policies by inspecting and assessing the health of client computers, restricting
network access when client computers are noncompliant with health policy, and remediating noncompliant
client computers to bring them into compliance with health policy before they are granted full network
access. NAP enforces health policies on client computers that are attempting to connect to a network;
NAP also provides ongoing health compliance enforcement while a client computer is connected to a
network. Reference: http://technet.microsoft.com/en-us/library/cc754378(v=ws.10).aspx
A.
QUESTION 4
You want to make your computer resistant to online hackers and malicious software.
Correct Answer: B
Explanation
Explanation/Reference:
QUESTION 5
Your company requires that users type a series of characters to access the wireless network.
E) WEP
F) WPA2 PSK
G) WPA2 Enterprise
H) MAC filtering
Correct Answer: B
Explanation
Explanation/Reference:
Explanation: Pre-shared key mode (PSK, also known as Personal mode) is designed for home and small
office networks that don't require the complexity of an 802.1X authentication server. [9] Each wireless
network device encrypts the network traffic using a 256 bit key. This key may be entered either as a
string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters
QUESTION 6
Many Internet sites that you visit require a user name and password.
How should you secure these passwords?
Correct Answer: D
A.
Explanation
Explanation/Reference:
QUESTION 7
A.
E) Theft
F) Compromise of the certificate chain
G) Man-in-the middle attacks
H) Denial of Service attacks
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 8
To prevent users from copying data to removable media, you should:
Correct Answer: B
Explanation
Explanation/Reference:
Reference: http://blogs.technet.com/b/askds/archive/2008/08/25/removable-storage-group-
policy-andwindows-server-2008-and-windows-vista.aspx
QUESTION 9
You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations
are members of an Active Domain.
You need to push out an internal certificate to Internet Explorer on all workstations.
E) Local policy
F) Logon script
G) Windows Update
H) Group policy
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 10
In Internet Explorer 8, the InPrivate Browsing feature prevents:
Correct Answer: D
Explanation
A.
Explanation/Reference:
Reference: http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing
QUESTION 11
The purpose of a digital certificate is to verify that a:
F) Computer is virus-free.
G) Private key belongs to a sender.
H) Digital document is complete.
Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is
an electronic document that uses a digital signature to bind a public key with an identity.
QUESTION 12
A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing.
Select the correct answer if the underlined text does not make the statement correct. Select "No change
is needed" if the underlined text makes the statement correct.
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 13
You are volunteering at an organization that gets a brand new web server. To make the server
more secure, you should add a second administrator account.
Select the correct answer if the underlined text does not make the statement correct. Select "No change
is needed" if the underlined text makes the statement correct.
Correct Answer: A
Explanation
A.
Explanation/Reference:
QUESTION 14
Role separation improves server security by:
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 15
The Windows Firewall protects computers from unauthorized network connections.
Select the correct answer if the underlined text does not make the statement correct. Select "No change
is needed'' if the underlined text makes the statement correct.
E) Email viruses
F) Phishing scams
G) Unencrypted network access
H) No change is needed
Correct Answer: D
Explanation
Explanation/Reference:
QUESTION 16
Coho Winery wants to increase their web presence and hires you to set up a new web server.
Coho already has servers for their business and would like to avoid purchasing a new one.
Which server is best to use as a web server, considering the security and performance concerns?
C) SQL Server
D) File Server
E) Domain Controller
F) Application Server
Correct Answer: C
Explanation
Explanation/Reference:
QUESTION 17
A user who receives a large number of emails selling prescription medicine is probably receiving
pharming mail.
Select the correct answer if the underlined text does not make the statement correct. Select "No change
is needed" if the underlined text makes the statement correct.
E) Malware
F) Spoofed mail
G) Spam
A.
H) No change is needed.
Correct Answer: C
Explanation
Explanation/Reference:
A.
QUESTION 18
The client computers on your network are stable and do not need any new features.
Correct Answer: D
Explanation
Explanation/Reference:
QUESTION 19
Which password attack uses all possible alpha numeric combinations?
E) Social engineering
F) Brute force attack
G) Dictionary attack
H) Rainbow table attack
Correct Answer: C
Explanation
Explanation/Reference:
QUESTION 20
E) digitally signed e-mail message:
Correct Answer: B
Explanation
Explanation/Reference:
Explanation:
By digitally signing a message, you apply your unique digital mark to the message. The digital
signature includes your certificate and public key. This information proves to the recipient that you
signed the contents of the message and not an imposter, and that the contents have not been altered
in transit. Reference: http://office.microsoft.com/en-us/outlook-help/secure-messages-with-a-digital-
signatureHP001230539.aspx
QUESTION 21
Passwords that contain recognizable words are vulnerable to a:
A.
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
A dictionary attack is a method of breaking into a password-protected computer or server by
systematically entering every word in a dictionary as a password. A dictionary attack can also be used in
an attempt to find the key necessary to decrypt an encrypted message or document.
Dictionary attacks work because many computer users and businesses insist on using ordinary words as
passwords. Dictionary attacks are rarely successful against systems that employ multiple-word phrases, and
unsuccessful against systems that employ random combinations of uppercase and lowercase letters mixed up
with numerals. Reference: http://searchsecurity.techtarget.com/definition/dictionary-attack
QUESTION 22
Account lockout policies are used to prevent which type of security attack?
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 23
What is the standard or basic collection of NTFS permissions?
C) Read and execute, read, write, full control, modify, list folder contents
D) Change permissions, read permissions, write permissions
E) Read attributes, list folder/read data, traverse folder/execute file
F) Create files/write data, create folders/append data, take ownership
Correct Answer: A
Explanation
Explanation/Reference:
Reference: http://technet.microsoft.com/en-us/library/bb727008.aspx
QUESTION 24
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?
Correct Answer: A
A.
Explanation
Explanation/Reference:
QUESTION 25
Which enables you to change the permissions on a folder?
A.
E) Take ownership
F) Extended attributes
G) Auditing
H) Modify
Correct Answer: D
Explanation
Explanation/Reference:
QUESTION 26
A group of users has access to Folder A and all of its contents. You need to prevent some of the
users from accessing a subfolder inside Folder A.
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 27
What are three examples of two-factor authentication? (Choose three.)
Explanation/Reference:
Explanation:
At minimum two-factor authentication requires two out of three regulatory-approved
authentication variables such as:
Something you know (like the PIN on your bank card or email password).
Something you have (the physical bank card or a authenticator token).
Something you are (biometrics like your finger print or iris pattern).
QUESTION 28
You need to limit the programs that can run on client computers to a specific
list. Which technology should you implement?
A.
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 29
The purpose of User Account Control (UAC) is to:
Correct Answer: B
Explanation
Explanation/Reference:
Explanation:
User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's
Windows machines. It aims to improve the security of Microsoft Windows by limiting application software
to standard user privileges until an administrator authorizes an increase or elevation. In this way, only
applications trusted by the user may receive administrative privileges, and malware should be kept from
compromising the operating system.
QUESTION 30
What does implementing Windows Server Update Services (WSUS) allow a company to manage?
Correct Answer: D
Explanation
Explanation/Reference:
QUESTION 31
The purpose of Microsoft Baseline Security Analyzer is to:
Correct Answer: A
Explanation
A.
Explanation/Reference:
QUESTION 32
The Graphic Design Institute hires you to help them set up a server for their 20-person team.
As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)
A.
Correct Answer: AB
Explanation
Explanation/Reference:
QUESTION 33
What are two attributes that an email message may contain that should cause a user to question
whether the message is a phishing attempt? (Choose two.)
Correct Answer: BC
Explanation
Explanation/Reference:
Reference: http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
QUESTION 34
Keeping a server updated:
Correct Answer: B
Explanation
Explanation/Reference:
QUESTION 35
Before you deploy Network Access Protection (NAP), you must install:
Correct Answer: B
Explanation
Explanation/Reference:
A.
Reference: http://technet.microsoft.com/en-us/library/bb681008.aspx
QUESTION 36
What is a common method for password collection?
E) Email attachments
F) Back door intrusions
A.
C. SQL Injection
D. Network sniffers
Correct Answer: D
Explanation
Explanation/Reference:
QUESTION 37
Which provides the highest level of security in a firewall?
A. Stateful inspection
B. Outbound packet filters
C. Stateless inspection
D. Inbound packet filters
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 38
The primary method of authentication in an SSL connection is passwords.
To answer, choose the option "No change is needed" if the underlined text is correct. If the underlined
text is not correct, choose the correct answer.
A. No change is needed
B. Certificates
C. IPsec
D. Biometrics
Correct Answer: B
Explanation
Explanation/Reference:
Reference: https://www.geocerts.com/ssl/understanding_authentication
QUESTION 39
You are setting up Remote Desktop on your computer. Your computer is a member of a domain.
You need to allow Remote Desktop to be able to get through your firewall for users on your
company's network.
Correct Answer: A
Explanation
A.
Explanation/Reference:
QUESTION 40
You are trying to connect to an FTP server on the Internet from a computer in a school lab. You cannot get a
connection. You try on another computer with the same results. The computers in the lab are able to browse the
Internet.
A.
A. A layer-2 switch
B. A wireless access point
C. A firewall
D. A layer-2 hub
Correct Answer: C
Explanation
Explanation/Reference:
QUESTION 41
What does NAT do?
Correct Answer: C
Explanation
Explanation/Reference:
Reference: http://en.wikipedia.org/wiki/Network_address_translation
QUESTION 42
The default password length for a Windows Server domain controller is:
A. 0
B. 5
C. 7
D. 14
Correct Answer: C
Explanation
Explanation/Reference:
QUESTION 43
You create a web server for your school. When users visit your site, they get a certificate error that
says your site is not trusted.
Correct Answer: A
Explanation
Explanation/Reference:
A.
QUESTION 44
What is an example of non-propagating malicious code?
A. A back door
B. A hoax
C. A Trojan horse
D. A worm
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 45
A brute force attack:
Correct Answer: B
Explanation
Explanation/Reference:
QUESTION 46
Humongous Insurance is an online healthcare insurance company. During an annual security audit a
security firm tests the strength of the company's password policy and suggests that Humongous
Insurance implement password history policy.
What is the likely reason that the security firm suggests this?
Correct Answer: B
Explanation
Explanation/Reference:
QUESTION 47
The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting it with the
WPS PIN.
A.
Select the correct answer if the underlined text does not make the statement correct. Select "No change
is needed" if the underlined text makes the statement correct.
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 48
What are three major attack vectors that a social engineering hacker may use? (Choose three.)
A. Telephone
B. Reverse social engineering
C. Waste management
D. Honey pot systems
E. Firewall interface
Explanation/Reference:
QUESTION 49
Which two security settings can be controlled by using group policy? (Choose two.)
A. Password complexity
B. Access to the Run... command
C. Automatic file locking
D. Encrypted access from a smart phone
Correct Answer: AB
Explanation
Explanation/Reference:
Reference: http://technet.microsoft.com/en-us/library/cc875814.aspx
QUESTION 50
Cookies impact security by enabling: (Choose two.)
Correct Answer: AD
Explanation
Explanation/Reference:
Reference: http://en.wikipedia.org/wiki/HTTP_cookie
QUESTION 51
A.
To keep third-party content providers from tracking your movements on the web, enable
InPrivate Browsing.
Select the correct answer if the underlined text does not make the statement correct. Select "No change
is needed'' if the underlined text makes the statement correct.
A. InPrivate Filtering
B. SmartScreen Filter
C. Compatibility Mode
A.
D. No change is needed
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 52
Which enables access to all of the logged-in user's capabilities on a computer?
A. Java applets
B. ActiveX controls
C. Active Server Pages (ASP)
D. Microsoft Silverlight
Correct Answer: B
Explanation
Explanation/Reference:
QUESTION 53
You need to install a domain controller in a branch office. You also need to secure the information on
the domain controller. You will be unable to physically secure the server.
Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
A read-only domain controller (RODC) is a new type of domain controller in the Windows Server® 2008
operating system. With an RODC, organizations can easily deploy a domain controller in locations
where physical security cannot be guaranteed. An RODC hosts read-only partitions of the Active
Directory® Domain Services (AD DS) database. Explanation: http://technet.microsoft.com/en-
us/library/cc732801 (v=ws.10).aspx
QUESTION 54
E-mail spoofing:
Correct Answer: C
Explanation
Explanation/Reference:
Reference: http://www.microsoft.com/mscorp/safety/technologies/senderid/technology.mspx
QUESTION 55
A.
A. Zone encryption
B. Password protection
C. Non-repudiation
D. Secure replication
Correct Answer: D
Explanation
Explanation/Reference:
Reference: http://books.google.com/books?id=CXy-2LBZCVgC&pg=PA201&dq= %22Active+Directory
+Integrated+Zones%22,+Secure+replication&hl=en&sa=X&ei=9s92U- v1KI-
zyASjzILIDg&ved=0CE0Q6AEwAQ#v=onepage&q=%22Active%20Directory
%20Integrated%20Zones% 22%2C%20Secure%20replication&f=false
QUESTION 56
Which two are included in an enterprise antivirus program? (Choose two.)
Correct Answer: BD
Explanation
Explanation/Reference:
QUESTION 57
Phishing is an attempt to:
Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
Phishing is the act of attempting to acquire sensitive information such as usernames, passwords,
and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in
an electronic communication.
QUESTION 58
Humongous Insurance needs to set up a domain controller in a branch office. Unfortunately, the
server cannot be sufficiently secured from access by employees in that office, so the company is
installing a Primary Domain Controller.
A.
Select the correct answer if the underlined text does not make the statement correct. Select "No change
is needed" if the underlined text makes the statement correct.
Correct Answer: A
Explanation
Explanation/Reference:
QUESTION 59
Where should you lock up the backup tapes for your servers?
Correct Answer: D
Explanation
Explanation/Reference:
Explanation:
Backup tapes should be stored off site, preferably in a fire safe, so that the data is available should a fire,
flood, or other disaster affect the location were the servers are.
QUESTION 60
Which is a special folder permission?
A. Read
B. Modify
C. Write
D. Delete
Correct Answer: D
Explanation
Explanation/Reference:
Reference: http://support.microsoft.com/kb/308419
QUESTION 61
When conducting a security audit the first step is to:
Correct Answer: A