0% found this document useful (0 votes)
73 views16 pages

Huhuu

Uploaded by

Augastine Ndeti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views16 pages

Huhuu

Uploaded by

Augastine Ndeti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Question 1: A local area network (LAN) is:

Question 1 options:

Technology that allows PCs, laptops, mobile phones, or tablet devices to connect to the

Internet without the need for a physical wired connection.

A private network that is created between two or more computers.

An Individual network that covers a single geographical area

A network that exists over a wide geographical area.

Question 2 

A Wireless Local Area Network (WLAN) is:

Question 2 options:

A network that connects computers within a geographic radius larger than LANs but smaller than
a WWAN..

A network that Interconnects devices in a short span, generally within a person's reach.

A network that allows users in a local area to form a network and gain access to the Internet.

A network that covers large areas such as neighboring towns and cities
Question 3: A Wireless Wide Area Network (WWAN) is:

Answer: A network that covers large areas such as neighboring towns and cities

Question 4: Wireless Fidelity (Wi-Fi) is:

Answer: The technology that allows PCs, laptops, mobile phones, or tablet devices to connect to
the Internet without the need for a physical wired connection.

xxxQuestion 5 :A public cloud is:

Question 5 options:

It is a mix of two or more different kinds of cloud architectures.

It belongs to a group of organizations with similar interests.

It is set up and used for a single entity or organization

It is the general storage and hosting service used by organizations and individual consumers.

xxxxQuestion 6: How is public cloud generally sold to customers?

Question 6 options:

You license cloud service and deploy them for perpetual use.

You pay no capital costs and pay only for what capacity you use.

You buy all of the infrastructure and pay for power and labor hourly.

You buy an all you can consume package for the entire enterprise paying a fixed fee for the year.

Question 7: A community cloud is:

Answer: It belongs to a group of organizations with similar interests.

Question 8: A private cloud is:

Answer: It is set up and used for a single entity or organization

Question 9: The Operating System is:

A piece of code that allows you to surf on the web.


A software program that blocks unwanted commercial bulk email.

The Operating System (OS) is a software program that controls all the functions of both the
hardware and the software of a computing device.

A piece of hardware the inspects and filters internet traffic.

Question 10 

Which of the following are good operating systems security practices?

Question 10 options:

Use default passwords

Keeping the operating systems up to date

Use simple file and printer sharing

Leave the guest account as is

Question 11

Which of the following are password cracking methods?

Question 11 options:
Shoulder surfing

Guessing

Brute force

All displayed answers are correct.

Question 12 

Which of the below is an unlikely method of malware propagation?

Question 12 options:

File sharing

Denial of service

Fake codec

Attachments

Question 13 
How often should I backup my important files?

Question 13 options:

Never

When they deleted.

Every time you migrated PC's

When there are changes to important files

Question 14)

Which files should be regularly backed up?

Question 14 options:

All listed choices are correct.

Photos

Contact information

Personal photos, music, and videos


Question 15 

Backup is:

Question 15 options:

Protecting your applications from scripting attacks.

Protecting your inbox from unwanted commercial bulk email.

A device or software used to block unwanted network traffic.

Is the process of creating duplicate copies of important data and storing it on the media storage
devices.

Question 16 

Where should backups be stored?

Question 16 options:

Different location than the master copy.

Next to the PC you're backing up.

In a cool dry place in the house.


None of the listed choices are correct

Question 17 

You notice that your on line backups are taking longer than usual. What could be the cause?

Question 17 options:

Your PC may be corrupted.

You are bandwidth constrained.

You have paused your on line backup.

You are doing a full backup real time.

Question 18 

Which of the following backup types only contain changes and updates from a full back up?

Question 18 options:

Incremental

both differential and incremental


Daily

Differential

Question 19 

Which of the following are not Windows or Apple Mac OS backup software?

Question 19 options:

Windows Backup

Time machine

Acronis

Norton Home Security

Question 20 

A cloud data breach is more serious than an ordinary data center breach because:

Question 20 options:

Generally less sensitive data is stored on clouds


There are fewer threats against cloud service providers.

A cloud data breach puts data of multiple users in the hands of attackers in a single go.

Cloud systems inherently more secure than on premise.

Question 21 

Which of the following is an example is of disciplined on line behavior?

Question 21 options:

Leaving your self logged in from a public computer on a cloud system.

Logging out and clearing browsing history regularly.

Using auto filled passwords.

Having "remember logins" enabled.

Question 22 

You are looking to connect your traditional IT on premise infrastructure with the lowest cost
cloud infrastructure service provider. Which kind of cloud should you invest in?

Question 22 options:
Public

Private

SaaS

Hybrid

Question 23 

Every operating system and application is subject to security flaws. Consequently,

Question 23 options:

Patch early and often

Delete your browser cache, passwords, and history

Avoid updates and changes to operating systems and applications

System compromises are generally unrelated to operating system vulnerabilities

Question 24 
Which of the following are good Windows system security practices?

Question 24 options:

Disable Windows User Account Control

Use NTFS

Enable Bit locker

Use both NTFS and Bit locker.

Question 25 

You receive a request to share your files with a coworker. You are asked to share a folder in your
Windows desktop on the network. Which of the following is a good security practice?

Question 25 options:

Share the local hard drive with default permissions.

Use IT approved collaboration tools. Common ones include SharePoint, Teams, F..k@Work.

Use the guest account on your PC for permissions.

Use a common non IT approved file sharing tool such as Box.


Question 26 

Firewalls have limitations. Which of the following is a weakness of firewalls?

Question 26 options:

They are ineffective against non-technical threats such as social engineering.

They are difficult to enable.

They are expensive and hard to obtain.

They cannot block traffic from the internet.

Question 27 

Which of the following are TRUE about wireless networks?

Question 27 options:

Wireless networks are generally private and secure.

Wireless networks offer more robust security than wired.

They are easily hacked so a strong password is highly required.


Wireless networks offer more security since the connections are generally encrypted.

Question 28 

Network connections are kept safe by browsing only on secure websites. Which of the following
are true?

Question 28 options:

Only PC based browsers use secure websites.

You must use a VPN to establish secure website connections.

Lock icons in browsers indicate when websites are secure.

URLs containing http:// are always secure.

Question 29 

As of noon today all of Padgett-Beale's wide area network connections are down. Your
networking group tested and verified that all internal switching and routing devices are
configured properly and functioning correctly including firewalls. Which of the following is the
potential root cause?

Question 29 options:

There is a denial of service attack against the Padgett-Beale network.


There is a Border Gateway Protocol (BGP) routing problem within the Telecom provider's
infrastructure.

There is a wide spread switching problem on the company's internal network.

Viruses are taking over all of the PC's on the network.

Question 30

Padgett-Beale's central office customer relationship management servers have suffered a disk
array failure. The secondary array has started the auto recovery process but is missing the entries
from the past 24 hours since the last daily backups. Which of the following backups do you
recover the missing CRM data?

Question 30 options:

The data is lost.

Last good weekly backup.

Last good differential backup.

Last good full backup.

Question 31 
Padgett Beale has moved their customer relationship service to salesforce.com (a customer
relationship management cloud software provider). They want to ensure that a replica of the data
is copied to an off premise infrastructure to ensure continuity in case of a disaster. Which of the
following cloud services would be an idea fit for the replica data?

Question 31 options:

Software as a service

Platform as a service

Infrastructure as a service

Security as a service

Question 32 

A front desk manager at one of Padgett-Beale's hotels reports that one of the staff members have
opened up a link from IT instructing them to patch their PC via a link. The link has downloaded
an executable called "OS Update v2_1.exe". What should the manager do next?

Question 32 options:

Contact the Padgett Beale IT department via helpdesk phone line to ensure that the OS patch is
legitimate.

Have the staff member run antivirus scan first then instruct them to patch the PC.

Have the staff member patch the PC, after all updating your Operating System is a priority.
Have them reply to the email and ask to verify the patch update?

You might also like