Security Fundamentals Professional Certification
Question 1
A brute force attack:
A. Uses known vulnerabilities in software
B. Tries all possible password variations
C. Exploits weak encryption protocols
D. Relies on social engineering tactics
Answer: B. Tries all possible password variations
Question 2
A digitally signed e-mail message:
A. Encrypts the message content
B. Validates the sender
C. Prevents spam filtering
D. Guarantees delivery
Answer: B. Validates the sender
Question 3
A group of users has access to Folder A and all of its contents. You need to prevent
some of the users from accessing a subfolder inside Folder A. What should you do
first?
A. Disable folder sharing
B. Change the subfolder permissions
C. Move the subfolder
D. Enable inheritance
,Answer: A. Disable folder sharing
Question 4
A network sniffer is software or hardware that:
A. Detects malware on the network
B. Captures and analyzes network communication
C. Monitors bandwidth usage
D. Blocks unauthorized access
Answer: B. Captures and analyzes network communication
Question 5
Account lockout policies are used to prevent which type of security attack?
A. Brute force attacks
B. Man-in-the-middle attacks
C. SQL injection
D. Cross-site scripting
Answer: A. Brute force attacks
Question 6
An attorney hires you to increase the wireless network security for the law firm's
office. The office has a very basic network, with just a modem and a router. Which of
these security modes offers the highest security?
A. WEP
B. WPA-Personal
C. WPA2-Personal
D. Open network with MAC filtering
, Answer: C. WPA2-Personal
Question 7
Basic security questions used to reset a password are susceptible to:
A. Brute force attacks
B. Social engineering
C. Dictionary attacks
D. Buffer overflow
Answer: B. Social engineering
Question 8
Before you deploy Network Access Protection (NAP), you must install:
A. Active Directory
B. Network Policy Server (NPS)
C. Domain Name System (DNS)
D. Windows Deployment Services
Answer: B. Network Policy Server (NPS)
Question 9
Bridging is a process of sending packets from source to destination on OSI layer 3.
Select the correct answer if the underlined text does not make the statement correct.
Select "No change is needed" if the underlined text makes the statement correct.
A. Routing
B. Switching
C. Filtering
D. No change is needed
Question 1
A brute force attack:
A. Uses known vulnerabilities in software
B. Tries all possible password variations
C. Exploits weak encryption protocols
D. Relies on social engineering tactics
Answer: B. Tries all possible password variations
Question 2
A digitally signed e-mail message:
A. Encrypts the message content
B. Validates the sender
C. Prevents spam filtering
D. Guarantees delivery
Answer: B. Validates the sender
Question 3
A group of users has access to Folder A and all of its contents. You need to prevent
some of the users from accessing a subfolder inside Folder A. What should you do
first?
A. Disable folder sharing
B. Change the subfolder permissions
C. Move the subfolder
D. Enable inheritance
,Answer: A. Disable folder sharing
Question 4
A network sniffer is software or hardware that:
A. Detects malware on the network
B. Captures and analyzes network communication
C. Monitors bandwidth usage
D. Blocks unauthorized access
Answer: B. Captures and analyzes network communication
Question 5
Account lockout policies are used to prevent which type of security attack?
A. Brute force attacks
B. Man-in-the-middle attacks
C. SQL injection
D. Cross-site scripting
Answer: A. Brute force attacks
Question 6
An attorney hires you to increase the wireless network security for the law firm's
office. The office has a very basic network, with just a modem and a router. Which of
these security modes offers the highest security?
A. WEP
B. WPA-Personal
C. WPA2-Personal
D. Open network with MAC filtering
, Answer: C. WPA2-Personal
Question 7
Basic security questions used to reset a password are susceptible to:
A. Brute force attacks
B. Social engineering
C. Dictionary attacks
D. Buffer overflow
Answer: B. Social engineering
Question 8
Before you deploy Network Access Protection (NAP), you must install:
A. Active Directory
B. Network Policy Server (NPS)
C. Domain Name System (DNS)
D. Windows Deployment Services
Answer: B. Network Policy Server (NPS)
Question 9
Bridging is a process of sending packets from source to destination on OSI layer 3.
Select the correct answer if the underlined text does not make the statement correct.
Select "No change is needed" if the underlined text makes the statement correct.
A. Routing
B. Switching
C. Filtering
D. No change is needed