Champion! 16
-
Upload
evramorina -
Category
Documents
-
view
8.456 -
download
0
Transcript of Champion! 16
1 A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the day.
Enable event logging on each user computer to check for unauthorized network access.
Enable event logging on all network devices to audit any suspicious user activity.
Audit the event logs on the server to check for unauthorized network access.
Observable Description Max Value
1 correctness of response2 points for Option 40 points for any other option
2
2 Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
It costs less because it is more efficient.
It does not impact the processing performance of the equipment it protects.
It always protects both the computer it is installed on as well as the rest of the network.
It is designed to protect more than one computer.
It is a free Windows operating system component.
Observable DescriptionMax Value
1correctness of response
Option 2 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required.
2
3 A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
packet filtering
proxy
stateful packet inspection
stateless packet inspection
Observable Description Max Value
1 correctness of response2 points for Option 30 points for any other option
2
4 A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-
level permissions to secure confidential information. Which file system should be used by the technician?
EXT
FAT
FAT32
NTFS
Observable Description Max Value
1 correctness of response2 points for Option 40 points for any other option
2
5 A technician needs to configure wireless networking on several new laptop computers. Which encryption method should the technician choose to achieve the best authentication and payload security?
MD5
PGP
WEP
WPA
Observable Description Max Value
1 correctness of response2 points for Option 40 points for any other option
2
6 Which simple wireless configuration technique can make the network invisible to unauthorized users?
Change the default password on the WAP.
Disable inactive wireless connections.
Filter all network access using MAC addresses.
Disable SSID broadcasting.
Observable Description Max Value
1 correctness of response2 points for Option 40 points for any other option
2
7 Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
Computers on a corporate network perform well without automatic updates because they are protected by a firewall.
Home users should avoid automatic updates because they are protected by Windows Internet Connection Firewall.
Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
Guest user accounts with limited access are unlikely to ever need updates because they are temporary users.
Observable Description Max Value
1 correctness of response2 points for Option 30 points for any other option
2
8 As part of the new security policy, a company decides to protect company data by performing backups on a regular basis. Which backup type takes the greatest amount of time and is commonly used in conjunction with another backup method?
differential
full
historical
incremental
Observable Description Max Value
1 correctness of response2 points for Option 20 points for any other option
2
9 Which quick solution should be tried first if a user is unable to login?
Verify that the CAPS and NUM lock keys are not on.
Reset the password for the user.
Assign the user a new username and password.
Add the user to a different group on the network.
Observable Description Max Value
1 correctness of response2 points for Option 10 points for any other option
2
10 Which three items should be included in a local security policy? (Choose three.)
list of approved ISPs
steps to take in the event of a security breach
contact list in the event of an emergency
details defining employment eligibility
complete schedule of lunch and break times for all employees
process for employees to gain access to equipment and data
Observable DescriptionMax Value
1correctness of response
Option 2, Option 3, and Option 6 are correct.1 point for each correct option.0 points if more options are selected than required.
3
11 Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (Choose two.)
ARP
DLC
MD5
NTP
SHA
TCP
Observable Description Max
Value
1correctness of response
Option 3 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required.
2
12 Which encryption technology provides secure tunnels?
asymmetric encryption
hash encoding
symmetric encryption
VPN
Observable Description Max Value
1 correctness of response2 points for Option 40 points for any other option
2
13 Which three physical security measures are employed to prevent security breaches and loss of data? (Choose three.)
antivirus program
software firewall
conduit
card key
strong password
security guard
Observable DescriptionMax Value
1correctness of response
Option 3, Option 4, and Option 6 are correct.1 point for each correct option.0 points if more options are selected than required.
3
14 Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
biometric device
security key fob
smart card
thumb drive
Observable Description Max Value
1 correctness of response2 points for Option 20 points for any other option
2
15 Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?
smart card
security key fob
storage area network
biometric device
Observable Description Max Value
1 correctness of response2 points for Option 10 points for any other option
2
16 Which two file-level permissions allow a user to delete a file? (Choose two.)
read
modify
read and execute
write
full control
list contents
Observable DescriptionMax Value
1correctness of response
Option 2 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required.
2
17 What is the default setting for Windows XP operating system updates?
automatic
only download updates
notify me
manual
Observable Description Max Value
1 correctness of response2 points for Option 10 points for any other option
2
18 Which Windows XP command initiates a backup from the command line?
archive
backup
compress
ntbackup
zip
Observable Description Max Value
1 correctness of response2 points for Option 40 points for any other option
2
19 After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
paperwork that is provided to customers
the manufacturer FAQ for network devices
firewall logs
network device logs
technical websites
Observable DescriptionMax Value
1correctness of response
Option 2 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required.
2
20 A customer contacts a call center with problems updating anti-virus software. What two types of question should the technician consider when gathering information from the caller? (Choose two.)
closed-ended
direct
indirect
open-ended
system-specific
vendor-specific
Observable DescriptionMax Value
1correctness of response
Option 1 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required.
2
21 Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
applications
physical addresses
packet size
ports
protocols
Observable DescriptionMax Value
1correctness of response
Option 4 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required.
2
22 A technician is asked whether the new procedures for backup use a backup rotation. Which procedure describes a backup rotation?
Reuse backup media and choose its storage location according to organizational guidelines. This ensures efficient and safe use of the backup media.
Have different members of the network staff perform the backups so that everyone has experience backing up data.
Back up the data at different times on different days so that a diverse amount of data is backed up.
Select the partitions to be archived at each backup according to a predefined plan to ensure everything is backed up over a given period.
Observable Description Max Value
1 correctness of response2 points for Option 10 points for any other option
2
23 The ABC Company network designers are designing the new corporate WiFi network. Which two precautions should be implemented because of security concerns with wireless networks? (Choose two.)
Shield the access point with a Faraday cage.
Send only essential passwords in clear text.
Disable broadcast of the SSID.
Configure WPA on access points.
Use the 2.4 GHz frequency band.
Use the 5.0 GHz frequency band.
Observable Description Max Value
1 correctness of response
Option 3 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required.
2
1 What is the purpose of using hash encoding?
to ensure complete security of the message digest
to ensure that the data remains the same even if the message digest is tampered with
to ensure that tampering with data is detectable
to regenerate the message digest when the original message digest is changed
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
2 Which feature must be enabled to monitor network activity within Windows XP? hash encoding
logging and auditing
password protection
symmetric encryption
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
3 Which item is kept secret in symmetric encryption? the mathematical function
the encryption key
the event log files
the message digest
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
4 Which device is used to ensure secure credit card payments? card key
conduit
security key fob
smart card
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
5 Which security device communicates with the computer over a short range? biometric device
conduit
security key fob
smart card
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
6 Which solution, when deployed on a network, looks for policy matches via the use of IP addresses and port numbers?
dual-homed gateway
packet filter firewall
proxy firewall
stateful inspection firewall
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
7 Which security element operates independently of computer resources? antispyware program
antivirus program
hardware firewall
software firewall
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
8 A network administrator disabled SSID transmission in a wireless network that is equipped with
WPA. However, an attacker managed to penetrate the network. The administrator then deployed a wireless security configuration tool to restrict access to listed clients. Which tool did the network administrator install?
MAC address filtering
WEP
wireless antenna
packet filtering
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
9 What is a feature of restrictive firewall security policy? It enables a specific list of ports, and only packets entering through those ports are permitted. It restricts the running of software to administrator accounts.
It limits the number of users who can access the network.
It permits access through all ports except those that are explicitly denied.
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
10 When Windows Update is being configured on a computer with Windows XP, which option can conflict with the security policy of an organization?
Automatic updates
Download updates
Notify me
Turn off automatic updates
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
11 A vendor needs to work in the company office for two weeks. Which type of account should be created for the vendor?
a guest account along with partial access to the network
a new account that gives the same privileges as company employees have
a re-enabled account of a former employee
a temporary account along with full access to the network
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
12 Which backup method will always ensure that all data could be restored from a single backup? daily backup
differential backup
incremental backup
full backup
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
13 While gathering data to troubleshoot a problem with a computer, the technician asked various questions. Which question is a closed-ended question?
Has the password been changed recently?
When did the problem start?
What type of firewall is being used?
What types of backups were used to back up the data on the computer over the last month?
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
14 Which software application monitors and reports the changes in program code? an application that protects the computer from adware
a patch to an application
a firewall application
IDS
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
15 Which encryption technology uses the SHA and MD5 algorithms? asymmetric encryption
hash encoding
symmetric encryption
VPN
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
16 Which action provides superior protection for a wireless network? configuring WEP with 32-bit encryption
configuring WPA
disabling MAC address filtering
retaining the default SSID
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
17 Why is the Notify me Windows update option more suitable for dial-up connections? It allows the user to control the update to prevent interruption of other network activity.
It automatically downloads updates and notifies the user to install them later.
It automatically installs updates when the user is not working on the computer.
It prevents checking for updates.
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
18 After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
paperwork that is provided to customers
the manufacturer FAQ for network devices
firewall logs
network device logs
technical websites
Observable DescriptionMax
Value
1correctness of response
Option 2 and Option 5 are correct.1 point for each correct option.0 points if more options are selected than required.
2
19 After analyzing and researching the problem by visiting several technical websites, a technician was unable to help a user to log in. Later, the user rebooted the computer and was able to log in. Which step did the technician omit during the troubleshooting process?
closing the issue with the customer
gathering data from the computer
gathering information from the user
trying quick solutions
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
20 Which security technique provides secure tunnels? asymmetric encryption
hash encoding
symmetric encryption
VPN
Observable DescriptionMax
Value
1correctness of response
2 points for Option 40 points for any other option
2
1Which encryption technique uses a mathematical function to create a numeric value unique to the data?
asymmetric encryption
hash encoding
VPN
WTLS
Observable DescriptionMax
Value
1correctness of response
2 points for Option 20 points for any other option
2
2 Which two methods help protect network cables? (Choose two.) enclosing the cables in conduits
enclosing the cables in cable locks
routing the cables inside the walls of a building
leave cables exposed to reveal tampering
using RFID tags
Observable DescriptionMax
Value
1correctness of response
Option 1 and Option 3 are correct.1 point for each correct option.0 points if more options are selected than required.
2
3 Which method of filtering traffic is used to monitor established network connections to allow only packets from established network connections?
packet filter
proxy firewall
stateful packet inspection
wireless NICs
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
4 Which Windows XP command performs a data backup? BACKUP
BUP
NTBACKUP
XPBACKUP
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
5 What is a disadvantage of configuring a firewall using permissive settings? Devices are exposed to attack. Packet transmission becomes complicated, requiring explicit access permission for all packets. The extra ports that are used by various applications are closed.
The settings may cause a user to be locked out of the system.
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
6 Which feature is characteristic of a guest account? It always remains active.
It can be configured to grant extensive access to resources on a temporary basis.
It disables access to the Internet, e-mail, and any printer.
It must be specifically configured for each guest.
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
7 Which technique may be used to generate a message digest from a hash encoding process? the use of a combination of identical encryption keys the use of a mathematical function to generate a corresponding text value that is unique to the message the use of the SHA or MD5 algorithms
the use of a key that is agreed to by the sender and receiver
Observable Description Max Value
1 correctness of response
2 points for Option 30 points for any other
2
option
8 Which method can turn a laptop into a zombie computer? improperly configuring the BIOS setting
partially uninstalling the operating system
reformatting the hard drive
remotely controlling the operating system
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
9 After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
paperwork that is provided to customers
the manufacturer FAQ for network devices
firewall logs
network device logs
technical websites
Observable DescriptionMax
Value1 correctness of
responseOption 2 and Option 5 are correct.1 point for each correct option.0 points if more options are selected
2
than required.
10 After analyzing and researching the problem by visiting several technical websites, a technician was unable to help a user to log in. Later, the user rebooted the computer and was able to log in. Which step did the technician omit during the troubleshooting process?
closing the issue with the customer
gathering data from the computer
gathering information from the user
trying quick solutions
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
11 What is the purpose of using hash encoding? to ensure complete security of the message digest
to ensure that the data remains the same even if the message digest is tampered with
to ensure that tampering with data is detectable
to regenerate the message digest when the original message digest is changed
Observable Description Max Value
1correctness of response
2 points for Option 30 points for any other option
2
12 Which characteristic of an application is used by the Windows XP firewall to determine whether the application is allowed to access the network?
file permission
port number
IRQ
username
Observable Description Max Value
1correctness of response
2 points for Option 20 points for any other option
2
13 Which right can only be granted by enabling the Full Control file-level permission? change the permissions of a file
delete a file
overwrite a file
run a file
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
14 Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
It costs less because it is more efficient.
It does not impact the processing performance of the equipment it protects.
It always protects both the computer it is installed on as well as the rest of the network.
It is designed to protect more than one computer.
It is a free Windows operating system component.
Observable DescriptionMax
Value
1correctness of response
Option 2 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required.
2
15 A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?
EXT
FAT
FAT32
NTFS
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
16 A technician needs to configure wireless networking on several new laptop computers. Which
encryption method should the technician choose to achieve the best authentication and payload security?
MD5
PGP
WEP
WPA
Observable Description Max Value
1correctness of response
2 points for Option 40 points for any other option
2
17 What is the default setting for Windows XP operating system updates? automatic
only download updates
notify me
manual
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
18 A user can locate the setup for an application on the server but is unable to download it. The user requests the help of a technician, who looks up the list of common problems and their recommended solutions. Which solution should the technician try to resolve this problem?
Change the read permission granted to the user on the setup file to read and execute.
Grant system administrator privileges to the user on a temporary basis.
Inform the user that this is due to a phishing attack and then perform an antivirus scan.
Verify that the MAC address of the computer is listed in the MAC address filter table.
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
19 Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?
smart card
security key fob
storage area network
biometric device
Observable Description Max Value
1correctness of response
2 points for Option 10 points for any other option
2
20 Which two NTFS file-level permissions allow a user to delete a file? (Choose two.) amend
delete
full control
modify
write
Observable DescriptionMax
Value
1correctness of response
Option 3 and Option 4 are correct.1 point for each correct option.0 points if more options are selected than required.
2
12622611514347