UPDATED ACTUAL Questions and
CORRECT Answers
Back Orifice is an example of a backdoor. T/F - CORRECT ANSWER - True
A group of compromised computers that have software installed by a worm or Trojan is known
as which of the following?
A. Botnet
B. Virus
C. Honeypot
D. Zombie - CORRECT ANSWER - A. Botnet
Which of the following is an inline device that checks all packets?
A. Host-biased intrusion detection system
B. Statistical anomaly
C. Network intrusion detection system
D. Personal software firewall - CORRECT ANSWER - A. Host-biased intrusion detection
system
By turning on the phishing filter a person can prevent spyware. T/F - CORRECT
ANSWER - True
Ransomware holds a user's files for ransom by encrypting them. T/F - CORRECT
ANSWER - True
Which of the following can help to secure the BIOS of a computer? Select two:
- Use a case lock
- Use a BIOS supervisor password.
,- Configure a user password
- Disable USB ports - CORRECT ANSWER - Use a case lock
Which of the following is the best mode to use when scanning for viruses?
- Safe mode
- Last known good configuration
- Command prompt only
- Boot into Windows normally - CORRECT ANSWER -
Which of the following methods of malware delivery is used in computer programs to bypass
normal authentication?
- Privilege escalation
- Active interception
- Backdoor
- Rootkit - CORRECT ANSWER -
Which one of the following navigiational paths shows the current service pack level to the user?
- Click start, right-click network, and select properties
- Click start, right click computer, and select properties
- Click start, right click computer, and select manage
- Click start, right click network, and select manage - CORRECT ANSWER - Click Start,
right-click Computer, and select Properties
An IT security technician needs to establish host based security for company workstations.
Which of the following will BEST meet this requirement?
- Implement IIS hardening by restricting service accounts
- Implement database hardening y applying vendor guidelines
- Implement perimeter firewall rules to restrict access
, - Implement OS hardening by applying GPOs - CORRECT ANSWER - Implement OS
hardening by applying GPOs
Which of the following should you implement to keep a well-maintained computer?
- Update the firewall
- Update the BIOS
- Use a surge protector
- Remove the unnecessary firewall - CORRECT ANSWER - Update the BIOS
To open the Local Group Policy console window, a user can only use the MMC in the Run
prompt. T/F - CORRECT ANSWER - False
The convert command converts an NTFS drive to FAT32. T/F - CORRECT ANSWER -
False
The systeminfo commands show a list of hot fixes that have been installed to the operating
system. - CORRECT ANSWER - True
The option Never Click for Updates is recommended by Microsoft. T/F - CORRECT
ANSWER -
A service pack is a group of updates, bug fixes, updated drivers, and security fixes. T/F -
CORRECT ANSWER - True
A recently installed application update caused a vital application to crash during the middle of
the
workday. The application remained down until a previous version could be reinstalled on the
server, and this resulted in a significant loss of data and revenue.
Which of the following could BEST prevent this issue from occurring again?
A. Application configuration baselines