ITS Network Security UPDATED Exam Questions and CORRECT Answers
7 views 0 purchase
Course
ITS Network Security
Institution
ITS Network Security
ITS Network Security UPDATED Exam
Questions and CORRECT Answers
Which controls are looked at as technical controls? - Correct Answer- Firewall and Intrusion
Detection System (IDS)
Which type of injection attack uses keywords such as SELECT and UPDATE to manipulate
data through a web form? -...
ITS Network Security UPDATED Exam
Questions and CORRECT Answers
Which controls are looked at as technical controls? - Correct Answer- Firewall and Intrusion
Detection System (IDS)
Which type of injection attack uses keywords such as SELECT and UPDATE to manipulate
data through a web form? - Correct Answer- SQL injection
An end user calls the help desk complaining about a web page not loading the most current
data for the page unless the user refreshes the page.
What should the help desk agent have the user do first? - Correct Answer- Clear out the cache
When one suspects a device has been affected by malware, what is the first step that should
be taken to remediate the device? - Correct Answer- Disconnect the device from the network
A good Audit Plan may collect both successful and failed events. - Correct Answer- True
Audit events take up computer resources and personnel time, so you should be selective
about the events to audit. - Correct Answer- True
You should always audit log-on successes. - Correct Answer- False
[Spoofing] redirects Internet traffic from one website to an identical-looking site in order to
trick you into entering your username and password into their database. - Correct Answer-
Pharming
What must take place for someone trying to enter a physical area of a building before access
control takes place? - Correct Answer- Authentication
MAC Filtering is best suited for large wireless networks. - Correct Answer- False, Mac
Filtering is best suited for small wireless networks.
,WEP is the strongest form of encryption for a wireless network. - Correct Answer- False, its
WAP
WPA/WPA2 can require an authentication server. - Correct Answer- True, if using 802.1x
mode
One of the layers of defense in the anti-phishing and malware protection strategies developed
by Microsoft is ___. - Correct Answer- SmartScreen Filter
One ways you can protect your computer from hackers and malicious software is to use ___.
- Correct Answer- Windows Firewall
What is considered the minimum length of a good password? - Correct Answer- Eight
characters
While launching a diagnostic software package, you select to RunAs Admin, this action
grants the executioner the ___ permissions. - Correct Answer- Least restrictive
If you were to launch a diagnostic software package without selecting RunAs Admin, this
action grants the executioner the ___ permissions. - Correct Answer- Most restrictive
___ allows multiple computers on an internal network to share one public IP address. -
Correct Answer- Network Address Translation (NAT)
Which type of VPN will often have a user connect through a web browser? - Correct Answer-
Secure Sockets Layer (SSL)
Which type of VPN connection usually connects two business entities? - Correct Answer-
Site-to-Site
What email filtering technique uses a list of verified DNS domains to verify that an email is
coming from a trusted IP address? - Correct Answer- Sender Policy Framework (SPF)
Applications-level firewalls can provide content filtering and virus protection. - Correct
Answer- True
, Application-level firewalls support caching. - Correct Answer- True
Application-level firewalls tend to be less resource intensive than that of a traditional
firewall. - Correct Answer- False
Which of the following are NTFS permissions? - Correct Answer- Read, Write, Modify
Which protocols are considered unsecure and should be avoided in a server enviroment? -
Correct Answer- Password Authentication Protocol (PAP) and Telnet
Which type of DNS record contains an IP address that is then used to look up an associated
host or domain name? - Correct Answer- Pointer Record (PTR)
IPSec encrypts data packets using AH. - Correct Answer- False
IPSec is a set of protocols that protects data transmission between hosts by providing
authentication and privacy. - Correct Answer- True
IPSec is used to create a secure tunnel between two computing devices. - Correct Answer-
False
IPSec uses digital signatures to create a chain of authority. - Correct Answer- False
Which of the following would be considered to be the strongest password? - Correct Answer-
j0hn$m1T
Your IT department is getting a barrage of calls from users saying that their pop-up blockers
are not blocking ads for huge discounts on software. Upon further research, you also
determine that your current malware signature files are not sufficient for removing this
nuisance from your systems.
Which type of attack is taking place? - Correct Answer- Adware
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.