Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Practice questions 5

Practice questions 5

Computer Science

Practice questions 5.1.5

1)On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do?

 

2. Which of the following are solutions that address physical security? (Select two)

 

3. Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?

 

4. What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal? 

5. You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which type of camera should you choose?

6.You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?

7.Which of the following CCTV camera types lets you adjust the distance that the camera can see?

8. Which of the following CCTV types would you use in areas with little or no lights?

9. Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry? (Select two)

10.Which of the following controls is an example of a physical access control method? 

 

11.Which of the following is the most important thing to do to prevent console access to the router?

 

12.You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?

 

13. You are an IT consultant and are visiting a ne client's site to become familiar with their network. As you walk around their facility, you note the following:
14. Which security-related recommendations should you make to this client? (Select two)

15. You are an IT consultant and are visiting a ne client's site to become familiar with their network. As you walk around their facility, you note the following:
-
16. Which security-related recommendations should you make to this client?

 

Practice Questions 5.3.6

17. You walk by the server room and notice a fire has started. What should you do first?

 

18.Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components? 

 

19.Which of the following fire extinguisher suppressant types is best used for electrical fires that might result when working with computer components? 

 

20.Which of the following fire extinguisher types poses a safety risk to users in the area?(Select two)

 

21.Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You also notice that this only seems to happen when the elevator is running. What should you do? 

 

22.What is the recommended humidity level for server rooms?

 

23.Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do to help reduce problems?

 

24.You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into the server components and affecting the availability of the network. Which of the following should you implement?

 

25.Which of the following statements about ESD is NOT correct?

 

26. Which of the following is the least effective power loss protection for computer systems? 

27.Besides protecting a computer from under voltages, a typical UPS also performs which two actions?

 

 

Practice Questions 5.4.7

28.A smart phone was lost at the airport. There is no way to recover the device. Which of the following will ensure data confidentiality on the device?

 

29.Which of the following are NOT reasons to remote wipe a mobile device? 

 

30.Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity? 

 

31Most mobile device management (MDM) systems can be configured to track the physical location of enrolled mobile devices. Arrange the location technology on the left in order of accuracy on the right, from most accurate to least accurate.

 

32.Your organization has recently purchases 20 tablets devices for the Human Resources department to use for training sessions. You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible. Which actions should you take? (select 2)

 

33.Over the last several years, the use of mobile devices within your organization has increased dramatically.
Unfortunately, many department heads circumvented your Information Systems procurement policies and directly purchased tablets and smartphones for their employees without authorization. As a result there is a proliferation of devices within your organization without accountability. You need to get things under control and begin tracking the devices that are owned by your organization. How should you do this?

 

 

Practice Questions 5.5.6

34.Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (select two)

-Link the Group Policy Object to the container where the tablets' computer objects reside.
- Manually configure security settings using the Local Group Policy Editor.
- Configure security settings in a Group Policy Object.
- Enroll the devices in a mobile device management system.
- Configure and apply security policy settings in a mobile device management system.
- Join the tablets to your domain.

 

35.Your organization recently purchase 18 iPad tablets for use by the organization's management team. These devices have iOS pre-installed on them. To increase the security of these devices, you wan to apply a default set of security related configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is a part of a complete solution)

36.Match each mobile device application control term on the right with the appropriate description on the left.

37. Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and steal data through a VPN connections using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice presidents home recorded someone rummaging through her garbage cans prior to the attack. The VP admitted to writing her VPN log in credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network. You've reviewed the VP's social media pages and found pictures of her home posted, but you didn't notice anything in he photos that would give away her home address. She assure you that her smart phone was never misplaced prior to the attack. Which security weakness is the most likely cause of the security breach?

 

38.Your organization is formulating a bring your own device (BYOD) security policy for mobile devices. Which of the following statements should be considered as you formulate your policy? 

 

39.Your organization's security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do?

 

40.Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account. Once of your sales reps left her tablet in an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe?

 

41.Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account. Once of your sales reps left his notebook at a customer's site. The device contains sensitive information and you want to change the password to prevent the data from being compromised. Which Intune portal should you use to remotely change the password?   

 

 

Practice Questions 5.6.3

42.The presence of unapproved modes on desktop system gives rise to the LAN being vulnerable to which of the following? 

 

43.Which of the following phone attacks adds unauthorized charges to a telephone bill?

 

44.Which Internet connectivity method sends voice phone calls using the TCP/IP protocol over digital data lines? 

 

45.A customer just received a phone bill on which there are charges for unauthorized services. This customer is a victim to which type of attack? 

 

 

 

Practice Questions 6.1.9

46.Which of the following best describes the purpose of using subnets?

 

47. Which of the following is NOT a reason to use subnets of a network?

 

48. Which of the following IPv6 addresses is the equivalent of IPv4 loop-back address of 127.0.0.1?

 

 

49. Which of the following describes an IPv6 address? (select two)

 

50. Which of the following correctly describe the most common format for expressing IPv6 addresses? (select two)

 

51. Which of the following are valid IPv6 addresses? (select two)

 

52. Which of the following is a valid IPv6 address? 

 

53. Routers operate at which level of the OSI model?  

 

54.You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (select two)  

 

 

Practice Questions 6.2.6

55. You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?

 

56. You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. What protocol should you implement? 

 

57. Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? 

 

58. You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select Two) 

 

59. Which port number is used by SNMP?

 

 

60. Which of the following ports does FTP use to establish sessions and manage traffic?  

 

61. Using the Netstat command you notice that a remote system has made a connection to your Windows server 2003 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing ?    

62. To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform some secure credit card transactions. 

 

 

63. Which of the following network services or protocols uses TCP/IP port 22?

 

 

64. Which of the following lists accurately describes TCP and UDP?

 

65. You are an application developer creating applications for a wide variety of customers. In which two of the following situations would you select a connectionless protocol?(Select 2)

 

66. You want to maintain tight security on your internal network so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?

 

 

67. Your company's network provides HTTP, HTTPS, and SSH access to remote employees. Which ports must be opened on the firewall to allow this traffic to pass?  

 

68.Your network recently experienced a series of attacks at the Telnet and FTP services. You have rewritten the security policy to abolish the unsecured services, and now you must secure the network using your firewall and routers. Which ports must be closed to prevent traffic directed to these two services?  

 

 

 

Practice Questions 6.3.8

69. What is the main difference between a DoS attack and a DDoS attack? 

 

70. An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?

 

71. You suspect that an Xmas tree attack is occurring on a system. Which two of the following could result if you do not stop the attack (Select two)? 

 

72. You need to enumerate the devices on your network and display the configuration details of the network. Which of the following utilities should you use. 

 

73. An attacker is conducting passive reconnaissance on a targeted company. Which of the following could he be doing?  

 

74. Which type of active scan turns off all flags in a TCP header?   

 

75. Which of the following Denial of Service (D0S) attacks uses ICMP packets and will only be successful if the victim has less bandwidth than the attacker?  

 

76. In which of the following Denial of Service (DoS) attacks does the victim's system rebuild invalid UDP packets, causing the system to crash or reboot? 

 

77. A SYN packet is received by a server. The SYN packet has the exact same address for both the sender and receiver address, which is the address of the servers. This is an example of what type of attack?

 

78. Which of the following is a form of denial of service attack that subverts the TCP three-way handshake process by attempting to open numerous sessions on a victim server but intentionally failing to complete the session by not sending the required packet?

 

79. Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo request using a bounce/ amplification network?

 

80. A SYN attack or SYN flood exploits or alters which of the element of the TCP three-way handshake?

 

81. When a SYN flood is altered so that the SYN packets are spoofed in order to define the source that destination address as a single victim IP address, the attack is now called what?  

 

82. A Smurf attack requires all but which of the following elements to be implemented?

 

83. Which of the following best describes the ping of death? 

 

 

 

 

Practice Questions 6.4.9

84. Which of the following is the best countermeasure against man-in-the-middle attacks? 

 

85. What is modified in the most common form of spoofing on a typical IP packet?  

 

86. Which type of Denial of Service (DoS) attack occurs when a name server receives malicious or
misleading data that incorrectly maps host names and IP addresses?  

 

87. Which of the following describes a man-in-the-middle attack?

 

88. Capturing packets as they travel from one host to another with the intent of altering the contents
of the packets is a form of which security concern?    

 

89. When the TCP/IP session state is manipulated so that a third party is able to insert alternate
packets into the communication stream, what type of attack has occurred?

 

90. What is the goal of a TCP/IP hijacking attack? 

 

91. Which of the following is not a protection against session hijacking?  

 

92. Which of the following is the most effective protection against IP packet spoofing on a private
network? 

 

 

 

93. Which of the following attacks tries to associate an incorrect MAC address with a known IP
address?

 

94. What are the most common network traffic packets captured and used in a replay attack?

 

95. When a malicious user captures authentication traffic and replays it against the network later,
what is the security problem you are most concerned about?

 

96. A router on the border of your network detects a packet with a source address that is from an
internal client but the packet was received on the Internet-facing interface. This is an example of
what form of attack?

 

97. An attacker uses an exploit to push a modified hosts file to client systems. This hosts file
redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and
financial information. What kind of exploit has been used in this scenario? (Choose two. Both responses are different names for the same exploit.)   

 

 

 

 

98. You are designing a Gibre Channel SAN implementation that will be used by the file servers in your org. Which of the following is true in this scenario? 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

7.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

rated 5 stars

Purchased 8 times

Completion Status 100%

Sitejabber (5.0)

BBC (5.0)

Trustpilot (4.8)

Google (5.0)