Time limit: 0
Quiz-summary
0 of 22 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
Information
good luck for you!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 22 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- Answered
- Review
-
Question 1 of 22
1. Question
1 pointsA user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?Correct
Incorrect
-
Question 2 of 22
2. Question
1 pointsWhich two security precautions will help protect a workplace against social engineering? (Choose two.)Correct
Incorrect
-
Question 3 of 22
3. Question
1 pointsWhat are two typical physical security precautions that a business can take to protect its computers and systems? (Choose two.)Correct
Incorrect
-
Question 4 of 22
4. Question
1 pointsWhich physical security technology can hold user authentication information, include software license protection, provide encryption, and provide hardware and software authentication that is specific to the host system?Correct
Incorrect
-
Question 5 of 22
5. Question
1 pointsIt has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)Correct
Incorrect
-
Question 6 of 22
6. Question
1 pointsIn which situation would a computer technician use the fixmbr command at the command prompt of a Windows XP computer to resolve a security issue?Correct
Incorrect
-
Question 7 of 22
7. Question
1 pointsAll users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to solve this issue?Correct
Incorrect
-
Question 8 of 22
8. Question
1 pointsYou want to dispose of a 2.5 terabyte hard drive that contains confidential financial information. What is the recommended procedure to achieve this?Correct
Incorrect
-
Question 9 of 22
9. Question
1 pointsWhat is the most effective way of securing wireless traffic?Correct
Incorrect
-
Question 10 of 22
10. Question
1 pointsWhich two items are used in asymmetric encryption? (Choose two.)Correct
Incorrect
-
Question 11 of 22
11. Question
1 pointsWhich two characteristics describe a worm? (Choose two.)Correct
Incorrect
-
Question 12 of 22
12. Question
1 pointsWhich type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?Correct
Incorrect
-
Question 13 of 22
13. Question
1 pointsWhich three questions should be addressed by organizations developing a security policy? (Choose three.) How should future expansion be done?Correct
Incorrect
-
Question 14 of 22
14. Question
1 pointsWhat does a malware detection program look for when running a scan?Correct
Incorrect
-
Question 15 of 22
15. Question
1 pointsPort triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?Correct
Incorrect
-
Question 16 of 22
16. Question
1 pointsWhich two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)Correct
Incorrect
-
Question 17 of 22
17. Question
1 pointsWhat is the primary goal of a DoS attack?Correct
Incorrect
-
Question 18 of 22
18. Question
1 pointsWhich question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?Correct
Incorrect
-
Question 19 of 22
19. Question
1 pointsWhich action would help a technician to determine if a denial of service attack is being caused by malware on a host?Correct
Incorrect
-
Question 20 of 22
20. Question
1 pointsA technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?Correct
Incorrect
-
Question 21 of 22
21. Question
1 pointsA user has reported that a computer web browser will not display the correct home page even if the default page is reset. What is the likely cause of this problem?Correct
Incorrect
-
Question 22 of 22
22. Question
1 pointsWhat is the name given to the programming-code patterns of viruses?Correct
Incorrect