Shared Flashcard Set

Details

Security Plus 2
Practice Test
100
Computer Networking
Professional
01/19/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
QUESTION NO: 101
A technician is rebuilding the infrastructure for an organization. The technician has been tasked
with making sure that the virtualization technology is implemented securely. Which of the following
is a concern when implementing virtualization technology?

A. The technician should verify that the virtual servers are dual homed so that traffic is securely
separated.
B. The technician should verify that the virtual servers and the host have the latest service packs
and patches applied.
C. The technician should subnet the network so each virtual server is on a different network
segment.
D. The technician should perform penetration testing on all the virtual servers to monitor
performance.
Definition
Answer: B
Term
QUESTION NO: 102
A technician is reviewing the logical access control method an organization uses. One of the
senior managers requests that the technician prevent staff members from logging on during nonworking
days.
Which of the following should the technician implement to meet managements request?

A. Enforce Kerberos
B. Deploy smart cards
C. Time of day restrictions
D. Access control lists
Definition
Answer: C
Term
QUESTION NO: 103
How would a technician implement a security patch in an enterprise environment?

A. Download the patch from the vendors secure website and install it on the most vulnerable
workstation.
B. Download the patch from the vendors secure website, test the patch and install it on all
workstations.
C. Download the patch from the vendors secure website and install it as needed.
D. Download the patch from the Internet, test the patch and install it on all of the
productionservers.WBerlin
Sans
Definition
Answer: B
Term
QUESTION NO: 104
Which of the following is considered the weakest encryption?

A. AES
B. DES
C. SHA
D. RSA
Definition
Answer: B
Term
QUESTION NO: 105
Which of the following encryption schemes is the public key infrastructure based on?

A. Quantum
B. Elliptical curve
C. Asymmetric
D. Symmetric
Definition
Answer: C
Term
QUESTION NO: 106
Which of the following BEST describes the term war driving?

A. Driving from point to point with a laptop and an antenna to find unsecured wireless access
points.
B. Driving from point to point with a wireless scanner to read other users emails through the
access point.
C. Driving from point to point with a wireless network card and hacking into unsecured wireless
access points.
D. Driving from point to point with a wireless scanner to use unsecured access points.
Definition
Answer: A
Term
QUESTION NO: 107
Which of the following statements BEST describes the implicit deny concept?

A. Blocks everything and only allows privileges based on job description
B. Blocks everything and only allows explicitly granted permissions
C. Blocks everything and only allows the minimal required privileges
D. Blocks everything and allows the maximum level of permissions
Definition
Answer: B
Term
QUESTION NO: 108
When is the BEST time to update antivirus definitions?

A. At least once a week as part of system maintenance
B. As the definitions become available from the vendor
C. When a new virus is discovered on the system
D. When an attack occurs on the network
Definition
Answer: B
Term
QUESTION NO: 109
Why would a technician use a password cracker?

A. To look for weak passwords on the network
B. To changea users passwords when they leave the company
C. To enforce password complexity requirements
D. To change users passwords if they have forgotten them
Definition
Answer: A
Term
QUESTION NO: 110
Users on a network report that they are receiving unsolicited emails from an email address that
does not change. Which of the following steps should be taken to stop this from occurring?

A. Configure a rule in eachusers router and restart the router.
B. Configure rules on the users host and restart the host.
C. Install an anti-spam filter on the domain mail servers and filter the email address.
D. Install an ACL on the firewall to block traffic from the sender and filter the IP address.
Definition
Answer: C
Term
QUESTION NO: 111
Which of the following is a true statement with regards to a NIDS?

A. A NIDS monitors and analyzes network traffic for possible intrusions.
B. A NIDS is installed on the proxy server.
C. A NIDS prevents certain types of traffic from entering a network.
D. A NIDS is normally installed on the email server.
Definition
Answer: A
Term
QUESTION NO: 112
A technician suspects that a piece of malware is consuming too many CPU cycles and slowing
down a system. Which of the following will help determine the amount of CPU cycles that are
being consumed?

A. Install HIDS to determine the CPU usage.
B. Run performance monitor to evaluate the CPU usage.
C. Install malware scanning software.
D. Use a protocol analyzer to find the cause of the traffic.
Definition
Answer: B
Term
QUESTION NO: 113
Which of the following are characteristics of a hash function? (Select TWO).

A. One-way
B. Encrypts a connection
C. Ensures data can be easily decrypted
D. Fixed length output
E. Requires a key
Definition
Answer: A,D
Term
QUESTION NO: 114
Which of the following is the MOST secure alternative for administrative access to a router?

A. SSH
B. Telnet
C. rlogin
D. HTTP
Definition
Answer: A
Term
QUESTION NO: 115
Which of the following might an attacker resort to in order to recover discarded company
documents?

A. Phishing
B. Insider theft
C. Dumpster diving
D. Shoulder surfing
Definition
Answer: C
Term
QUESTION NO: 116
Which of the following creates a security buffer zone between two rooms?

A. Mantrap
B. DMZ
C. Turnstile
D. Anti-pass back
Definition
Answer: A
Term
QUESTION NO: 117
Which of the following tools would be used to review network traffic for clear text passwords?

A. Port scanner
B. Protocol analyzer
C. Firewall
D. Password cracker
Definition
Answer: B
Term
QUESTION NO: 118
Kerberos uses which of the following trusted entities to issue tickets?

A. Ticket Granting System
B. Certificate Authority
C. Internet Key Exchange
D. Key Distribution Center
Definition
Answer: D
Term
QUESTION NO: 119
Which of the following specifies a set of consistent requirements for a workstation or server?

A. Vulnerability assessment
B. Imaging software
C. Patch management
D. Configuration baseline
Definition
Answer: D
Term
QUESTION NO: 120
A companys website allows customers to search for a product and display the current price and
quantity available of each product from the production database. Which of the following would
invalidate an SQL injection attack launched from the lookup field at the web server level?

A. Security template
B. Buffer overflow protection
C. NIPS
D. Input validation
Definition
Answer: D
Term
QUESTION NO: 121
Which of the following virtual machine components monitors and manages the various virtual
instances?

A. VMOS
B. VCPU
C. Hypervisor
D. Virtual supervisor
Definition
Answer: C
Term
QUESTION NO: 122
A smurf attack is an example of which of the following threats?

A. ARP Poisoning
B. DoS
C. TCP/IP Hijacking
D. Man-in-the-middle
Definition
Answer: B
Term
QUESTION NO: 123
Which of the following is the BEST tool for allowing users to go to approved business-related
websites only?

A. Internet content filter
B. Firewall
C. ACL
D. Caching server
Definition
Answer: A
Term
QUESTION NO: 124
Which of the following is a security trait of a virtual machine?

A. Provides additional resources for testing
B. Provides real-time access to all system processes
C. Provides a read-only area for executing code
D. Provides a restricted environment for executing code
Definition
Answer: D
Term
QUESTION NO: 125
An unauthorized user intercepted a users password and used this information to obtain the
companys administrator password. The unauthorized user can use the administrators password to
access sensitive information pertaining to client data. Which of the following is this an example of?

A. Session hijacking
B. Least privilege
C. Privilege escalation
D. Network address translation
Definition
Answer: C
Term
QUESTION NO: 126
Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is
concerned that sensitive files can be copied to the USB drives. Which of the following mitigation
techniques would address this concern? (Select TWO).

A. Disable the USB root hub within the OS.
B. Install anti-virus software on the USB drives.
C. Disable USB within the workstations BIOS.
D. Apply the concept of least privilege to USB devices.
E. Run spyware detection against all workstations.
Definition
Answer: A,C
Term
QUESTION NO: 127
An administrator has developed an OS install that will implement the tightest security controls
possible. In order to quickly replicate these controls on all systems, which of the following should
be established?

A. Take screen shots of the configuration options.
B. Create an image from the OS install.
C. Create a boot disk for the operating system.
D. Implement OS hardening procedures.
Definition
Answer: B
Term
QUESTION NO: 128
After registering an email address on a website, a user starts receiving messages from unknown
sources. The email account is new, and therefore the user is concerneD. This type of message
traffic is referred to as:

A. instant messagetraffiC.
B. SPIM.
C. S/MIME.
D. spam.
Definition
Answer: D
Term
QUESTION NO: 129
A technician is testing the security of a new database application with a website front-end. The
technician notices that when certain characters are input into the application it will crash the
server. Which of the following does the technician need to do?

A. Utilize SSL on the website
B. Implement an ACL
C. Lock-down the database
D. Input validation
Definition
Answer: D
Term
QUESTION NO: 130
An administrator in a small office environment has implemented an IDS on the network perimeter
to detect malicious traffic patterns. The administrator still has a concern about traffic inside the
network originating between client workstations. Which of the following could be implemented?

A. HIDS
B. A VLAN
C. A network router
D. An access list
Definition
Answer: A
Term
QUESTION NO: 131
A user is redirected to a different website when the user requests the DNS record
www.xyz.comptiA. com. Which of the following is this an example of?

A. DNS poisoning
B. DoS
C. DNS caching
D. Smurf attack
Definition
Answer: A
Term
QUESTION NO: 132
A company wants to host public servers on a new network. These servers will include a website
and
mail server.Which of the following should be implemented on the network to isolate these public
hosts from the rest of the network?

A. IPv6
B. IPSec
C. DMZ
D. VLAN
Definition
Answer: C
Term
QUESTION NO: 133
A user has decided that they do not want an internal LAN segment to use public IP addresses.
The user wants to translate them as private IP addresses to a pool of public IP addresses to
identify them on the Internet. Which of the following does the user want to implement?

A. IPSec
B. NAT
C. SSH
D. SFTP
Definition
Answer: B
Term
QUESTION NO: 134
An administrator has been studying stateful packet inspection and wants to implement this security
technique on the network. Which of the following devices could the administrator use to BEST
utilize stateful packet inspection?

A. Hub
B. IDS
C. Switch
D. Firewall
Definition
Answer: D
Term
QUESTION NO: 135
Which of the following is the primary purpose of a honeypot?

A. Translate addresses at the perimeter
B. To provide a decoy target on the network
C. Provide cryptography for the network
D. Work as a network proxy
Definition
Answer: B
Term
QUESTION NO: 136
An administrator wants to ensure that that no equipment is damaged when there is a fire or false
alarm in the server room. Which of the following type of fire suppression systems should be used?

A. Carbon Dioxide
B. Hydrogen Peroxide
C. Wet pipe sprinkler
D. Deluge sprinkler
Definition
Answer: A
Term
QUESTION NO: 137
Which of the following is a CRL composed of?

A. Public Key Infrastructure (PKI)
B. Expired or revoked certificates
C. Certificate authorities
D. Expired user accounts
Definition
Answer: B
Term
QUESTION NO: 138
Which of the following is the primary purpose of a CA?

A. LANMAN validation
B. Encrypt data
C. Kerberos authentication
D. Issue private/public keys
Definition
Answer: D
Term
QUESTION NO: 139
An administrator wants to replace telnet with a more secure protocol to manage a network device.
Which of the following should be implemented on the network?

A. SMTP
B. SNMP
C. SFTP
D. SSH
Definition
Answer: D
Term
QUESTION NO: 140
A user is attempting to receive digitally signed and encrypted email messages from a remote
office.
Which of the following protocols does the system need to support?

A. SMTP
B. S/MIME
C. ISAKMP
D. IPSec
Definition
Answer: B
Term
QUESTION NO: 141
An administrator does not want anyone to VPN from inside the network to a remote office or
network. Which of the following protocols should be blocked outbound on the network?

A. TPM
B. OVAL
C. SNMP
D. ISAKMP
Definition
Answer: D
Term
QUESTION NO: 142
An administrator is implementing a public website and they want all client connections to the server to be encrypted via their web browser. Which of the following should be implemented?

A. SSL
B. SHA-1
C. Blowfish
D. 3DES
Definition
Answer: A
Term
QUESTION NO: 143
Which of the following is MOST likely provided by asymmetric key cryptography?

A. Performance
B. A pre-shared key
C. Kiting
D. Confidentiality
Definition
Answer: D
Term
QUESTION NO: 144
All of the following are symmetric key algorithms EXCEPT:

A. ECC.
B. Rijndael.
C. 3DES.
D. RC4
Definition
Answer: A
Term
QUESTION NO: 145
Which of the following is true about ECC algorithms?

A. It is the algorithm used in PGP.
B. It is implemented in portable devices.
C. It is a private key algorithm.
D. It is CPUintensivE.
Definition
Answer: B
Term
QUESTION NO: 146
Which of the following is a way to encrypt session keys using SSL?

A. Session keys are sentunencrypteD.
B. Session keys are encrypted using an asymmetric algorithm.
C. Session keys are sent in clear text because they are private keys.
D. Session keys are encrypted using a symmetric algorithm.
Definition
Answer: B
Term
QUESTION NO: 147
Which of the following can reduce the risk associated with password guessing attacks? (Select TWO).

A. Implement single sign-on.
B. Implement shared passwords.
C. Implement account-lockout thresholds.
D. Implement shadow passwords.
E. Implement stronger password complexity policies.
Definition
Answer: C,E
Term
QUESTION NO: 148
Which of the following is a common practice in forensic investigation?

A. Performing aGutman sanitization of the drive
B. Performing a binary copy of the systems storage media
C. Performing a file level copy of the systems storage media
D. Performing a sanitization of the drive
Definition
Answer: B
Term
QUESTION NO: 149
Which of the following is done to ensure appropriate personnel have access to systems and
networks? (Select TWO).

A. Conduct periodic penetration testing assessments.
B. Conduct periodic personnel employment verifications.
C. Conduct rights review of users and groups.
D. Conduct virus scan.
E. Conduct vulnerability assessments.
Definition
Answer: B,C
Term
QUESTION NO: 150
Antivirus software products detect malware by comparing the characteristics of known instances
against which of the following type of file sets?

A. Signature
B. Text
C. NIDS signature
D. Dynamic Library
Definition
Answer: A
Term
QUESTION NO: 151
Which of the following type of fire suppression tools would cause the MOST damage to electrical
equipment?

A. Water
B. Carbon Dioxide
C. Halon
D. Foam
Definition
Answer: A
Term
QUESTION NO: 152
Which of the following is the BEST process of removing PII data from a disk drive before reuse?

A. Destruction
B. Sanitization
C. Reformatting
D. Degaussing
Definition
Answer: B
Term
QUESTION NO: 153
When assigning permissions, which of the following concepts should be applied to enable a person to perform their job task?

A. Rule based
B. Discretionary access control (DAC)
C. Least privilege
D. Role based
Definition
Answer: C
Term
QUESTION NO: 154
While conducting a review of the system logs, a user had attempted to log onto the network over
250 times. Which of the following type of attacks is MOST likely occurring?

A. Brute force
B. Phishing
C. Spamming
D. DNS spoofing
Definition
Answer: A
Term
QUESTION NO: 155
Users do not want to enter credentials to each server or application to conduct their normal work.Which of the following type of strategies will resolve this issue?

A. Smart card
B. Two-factor authentication
C. Biometrics
D. SSO
Definition
Answer: D
Term
QUESTION NO: 156
A user was trying to update an open file but when they tried to access the file they were denied. Which of the following would explain why the user could not access the file?

A. Audit only access
B. Execute only access
C. Rights are not set correctly
D. Write only access
Definition
Answer: C
Term
QUESTION NO: 157
Accessing a system or application using permissions from another users account is a form of
which of the following?

A. Phishing
B. Domain kiting
C. ARP spoofing
D. Privilege escalation
Definition
Answer: D
Term
QUESTION NO: 158
Which of the following is an important reason for password protecting the BIOS?

A. To maintain password complexity requirements
B. To prevent system start-up without knowing the password
C. To keep a user from changing the boot order of the system
D. To keep a virus from overwriting the BIOS
Definition
Answer: C
Term
QUESTION NO: 159
Which of the following is a software bundle containing multiple security fixes?

A. Patch management
B. Ahotfix
C. Service pack
D. A patch
Definition
Answer: C
Term
QUESTION NO: 160
A company uses a policy of assigning passwords to users, by default the passwords are based off of the word $ervicexx, where xx is the last two numbers of the users cell phone number. The users are not required to change this password. Which of the following is this an example of?

A. Default accounts
B. Known plain text
C. Back door
D. Weak passwords
Definition
Answer: D
Term
QUESTION NO: 161
Which of the following is an installable package that includes several patches from the same
vendor for various applications?

A. Hotfix
B. Patch template
C. Service pack
D. Patch rollup
Definition
Answer: C
Term
QUESTION NO: 162
Which of the following is a best practice to prevent users from being vulnerable to social
engineering?

A. Have a solid acceptable use policy in place with a click through banner.
B. Provide thorough and frequent user awareness training.
C. Haveuser sign both the acceptable use policy and security based HR policy.
D. Provide a service level agreement that addresses social engineering issues.
Definition
Answer: B
Term
QUESTION NO: 163
The RAS logs on a server show 100 errors in a two minute time period from an attempt to access an account. The error log shows unknown username or password. Which of the following is this an
example of?

A. The local firewall is blocking GRE packets.
B. An unauthorized attempt to access the server.
C. The end users ISPis having issues with packet loss.
D. One of the users forgot their password and kept trying to login.
Definition
Answer: B
Term
QUESTION NO: 164
An administrator notices that former temporary employees accounts are still active on a domain.
Which of the following can be implemented to increase security and prevent this from happening?

A. Run a last logon script to look for inactive accounts.
B. Implement an account expiration date for temporary employees.
C. Implement a password expiration policy.
D. Implement time of day restrictions for all temporary employees.
Definition
Answer: B
Term
QUESTION NO: 165
Which of the following is the primary security risk with coaxial cable?

A. Diffusion of the core light source
B. Data emanation from the core
C. Crosstalk between the wire pairs
D. Refraction of the signal
Definition
Answer: B
Term
QUESTION NO: 166
Which of the following is a collection of patches?

A. A security template
B. A service pack
C. A securityhotfix
D. A security baseline
Definition
Answer: B
Term
QUESTION NO: 167
Which of the following would allow an administrator to find weak passwords on the network?

A. A networkmapper
B. A hash function
C. A password generator
D. A rainbow table
Definition
Answer: D
Term
QUESTION NO: 168
Which of the following is the BEST place where the disaster recovery plan should be kept?

A. Printed out and kept in the desk of the CIO
B. At multiple offsite locations
C. Multiple copies printed out and kept in the server room
D. On the network file server
Definition
Answer: B
Term
QUESTION NO: 169
Which of the following is established immediately upon evidence seizure?

A. Start the incident respond plan
B. Damage and loss control
C. Chain of custody
D. Forensic analysis
Definition
Answer: C
Term
QUESTION NO: 170
Which of the following is a required privilege that an administrator must have in order to restore a
public/private key set on a certificate authority (CA)?

A. Recovery agent
B. Registration authority
C. Domain administrator
D. Group administrator
Definition
Answer: A
Term
QUESTION NO: 171
Which of the following algorithms have the smallest key space?

A. IDEA
B. SHA-1
C. AES
D. DES
Definition
Answer: D
Term
QUESTION NO: 172
Which of the following is the MOST recent addition to cryptography?

A. AES
B. DES
C. 3DES
D. PGP
Definition
Answer: A
Term
QUESTION NO: 173
Which of the following requires a common pre-shared key before communication can begin?

A. Public key infrastructure
B. Symmetric key cryptography
C. Secure hashing algorithm
D. Asymmetric key cryptography
Definition
Answer: B
Term
QUESTION NO: 174
Which of the following provides the MOST comprehensive redundancy for an entire site with the
least downtime?

A. A warm site
B. A cold site
C. A mobile site
D. A hot site
Definition
Answer: D
Term
QUESTION NO: 175
Which of the following allows devices attached to the same switch to have separate broadcast
domains?

A. NAT
B. DMZ
C. NAC
D. VLAN
Definition
Answer: D
Term
QUESTION NO: 176
Which of the following allows for notification when a hacking attempt is discovered?

A. NAT
B. NIDS
C. Netflow
D. Protocol analyzer
Definition
Answer: B
Term
QUESTION NO: 177
When dealing with a 10BASE5 network, which of the following is the MOST likely security risk?

A. An incorrect VLAN
B. SSID broadcasting
C. A repeater
D. A vampire tap
Definition
Answer: D
Term
QUESTION NO: 178
Which of the following allows a technician to scan for missing patches on a device without actually attempting to exploit the security problem?

A. A vulnerability scanner
B. Security baselines
C. A port scanner
D. Group policy
Definition
Answer: A
Term
QUESTION NO: 179
Which of the following allows for proof that a certain person sent a particular email?

A. Steganography
B. Integrity
C. Trusted Platform Module
D. Non-repudiation
Definition
Answer: D
Term
QUESTION NO: 180
Which of the following uses a key ring?

A. AES
B. DES
C. PGP
D. RSA
Definition
Answer: C
Term
QUESTION NO: 181
Which of the following allows for the highest level of security at time of login?

A. Single sign-on
B. Two-factor authentication
C. One-factor authentication
D. NTLMv2
Definition
Answer: B
Term
QUESTION NO: 182
Sending a patch through a testing and approval process is an example of which of the following?

A. Disaster planning
B. Change management
C. Acceptable use policies
D. User education and awareness training
Definition
Answer: B
Term
QUESTION NO: 183
Sending continuous TCP requests to a device and ignoring the return information until the device
ceases to accept new connections is an example of which of the following?

A. TCP/IP hijacking
B. DNS poisoning
C. Kiting
D. DoS
Definition
Answer: D
Term
QUESTION NO: 184
Which of the following would use a group of bots to stop a web server from accepting new
requests?

A. DoS
B. DDoS
C. MAC
D. ARP
Definition
Answer: B
Term
QUESTION NO: 185
Which of the following is the MOST likely to generate static electricity?

A. Low humidity and high temperature
B. High humidity and low temperature
C. Low humidity and low temperature
D. High humidity and high temperature
Definition
Answer: A
Term
QUESTION NO: 186
Using an asymmetric key cryptography system, where can a technician generate the key pairs?

A. A certificate authority
B. IETF
C. A key escrow service
D. A recovery agent
Definition
Answer: A
Term
QUESTION NO: 187
Which of the following media is the LEAST likely to be successfully tapped into?

A. Unshielded twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. Shielded twisted pair cable
Definition
Answer: C
Term
QUESTION NO: 188
Which of the following allows a person to find public wireless access points?

A. Weak encryption
B. 8021x
C. SSID broadcast
D. Data emanation
Definition
Answer: C
Term
QUESTION NO: 189
Which of the following allows a file to have different security permissions for users that have the
same roles or user groups?

A. Mandatory Access Control (MAC)
B. Role-Based Access Control (RBAC)
C. Discretionary Access Control (DAC)
D. Rule-Based Access Control (RBAC)
Definition
Answer: C
Term
QUESTION NO: 190
A DMZ has a fake network that a hacker is attacking. Which of the following is this an example of?

A. Firewall
B. Man-in-the-middle
C. Proxy server
D. Honeypot
Definition
Answer: D
Term
QUESTION NO: 191
A company decides that the purchasing agent and the accounts receivable agent should exchange positions in order to allow for more oversight of past transactions. Which of the following is this an example of?

A. Least privilege
B. Implicit deny
C. Separation of duties
D. Job rotation
Definition
Answer: D
Term
QUESTION NO: 192
A user complains that the color laser printer continuously gives an access denied message while attempting to print a text document. The administrator logs onto the PC and prints successfully. Which of the following should the administrator check FIRST?

A. That the printer has the correct size of paper in each of the trays
B. That the toner should be changed in the printer
C. That the user has sufficient rights to print to the printer
D. That the user is attempting to print to the correct printer tray
Definition
Answer: C
Term
QUESTION NO: 193
Which of the following uses a sandbox to manage a programs ability to access system resources?

A. Java
B. ActiveX
C. JavaScript
D. Cold Fusion
Definition
Answer: A
Term
QUESTION NO: 194
Which of the following allows a technician to view the security permissions of a file?

A. The access control list
B. The security baseline
C. The data emanation
D. The local security template
Definition
Answer: A
Term
QUESTION NO: 195
A user is denied access to a file. The user had access to the file yesterday. Which of the following
is the FIRST action for the technician to take?

A. Deny the users request and forward to the human resources department.
B. Reboot the system.
C. Verify that theusers permissions are correct.
D. Grant access to the file.
Definition
Answer: C
Term
QUESTION NO: 196
A user is convinced that someone is attempting to use their user account at night. Which of the
following should an administrator check FIRST in order to prove or disprove this claim?

A. The IDS logs
B. The security application logs
C. The local security logs
D. The firewall logs
Definition
Answer: C
Term
QUESTION NO: 197
A user reports that a web based application is not working after a browser upgrade. Before the upgrade, a login box would appear on the screen and disappear after login. The login box does not appear after the upgrade. Which of the following BEST describes what to check FIRST?

A. That the software based firewall application trusts this site
B. That the pop-up blocker application trusts this site
C. That the antivirus application trusts this site
D. That the anti-spam application trusts this site
Definition
Answer: B
Term
QUESTION NO: 198
An intrusion has been detected on a company's network from the Internet. Which of the following should be checked FIRST?

A. The firewall logs
B. The DNS logs
C. The access logs
D. The performance logs
Definition
Answer: A
Term
QUESTION NO: 199
A user needs to verify that a patch file downloaded from a third party has not been modified since
the time that the original manufacturer released the patch. Which of the following is the BEST way to verify that the file has not been modified?

A. Compare the final MD5 hash with the original.
B. Download the patch file over an AES encrypted VPN connection.
C. Compare the final LANMAN hash with the original.
D. Download the patch file through a SSL connection.
Definition
Answer: A
Term
QUESTION NO: 200
A technician suspects that one of the network cards on the internal LAN is causing a broadcast storm. Which of the following would BEST diagnose which NIC is causing this problem?

A. The NIDS log file
B. A protocol analyzer
C. The local security log file
D. The local firewall log file
Definition
Answer: B
Supporting users have an ad free experience!