A group of compromised computers that have software installed by a worm or Trojan is known as which
of the following?
A. Botnet
B. Virus
C. Honeypot
D. Zombie - Correct Answer A. Botnet
Which of the following is an inline device that checks all packets?
A. Host-biased intrusion detection system
B. Statistical anomaly
C. Network intrusion detection system
D. Personal software firewall - Correct Answer A. Host-biased intrusion detection system
By turning on the phishing filter a person can prevent spyware. T/F - Correct Answer True
Ransomware holds a user's files for ransom by encrypting them. T/F - Correct Answer True
Which of the following can help to secure the BIOS of a computer? Select two:
- Use a case lock
- Use a BIOS supervisor password.
- Configure a user password
- Disable USB ports - Correct Answer Use a case lock
Which of the following is the best mode to use when scanning for viruses?
- Safe mode
,- Last known good configuration
- Command prompt only
- Boot into Windows normally - Correct Answer
Which of the following methods of malware delivery is used in computer programs to bypass normal
authentication?
- Privilege escalation
- Active interception
- Backdoor
- Rootkit - Correct Answer
Which one of the following navigiational paths shows the current service pack level to the user?
- Click start, right-click network, and select properties
- Click start, right click computer, and select properties
- Click start, right click computer, and select manage
- Click start, right click network, and select manage - Correct Answer Click Start, right-click Computer,
and select Properties
An IT security technician needs to establish host based security for company workstations. Which of the
following will BEST meet this requirement?
- Implement IIS hardening by restricting service accounts
- Implement database hardening y applying vendor guidelines
- Implement perimeter firewall rules to restrict access
- Implement OS hardening by applying GPOs - Correct Answer Implement OS hardening by applying
GPOs
Which of the following should you implement to keep a well-maintained computer?
- Update the firewall
- Update the BIOS
- Use a surge protector
, - Remove the unnecessary firewall - Correct Answer Update the BIOS
To open the Local Group Policy console window, a user can only use the MMC in the Run prompt. T/F -
Correct Answer False
The convert command converts an NTFS drive to FAT32. T/F - Correct Answer False
The systeminfo commands show a list of hot fixes that have been installed to the operating system. -
Correct Answer True
The option Never Click for Updates is recommended by Microsoft. T/F - Correct Answer
A service pack is a group of updates, bug fixes, updated drivers, and security fixes. T/F - Correct Answer
True
A recently installed application update caused a vital application to crash during the middle of the
workday. The application remained down until a previous version could be reinstalled on the
server, and this resulted in a significant loss of data and revenue.
Which of the following could BEST prevent this issue from occurring again?
A. Application configuration baselines
B. Application hardening
C. Application access controls
D. Application patch management - Correct Answer
Which commands disable a service in the command line?
- net stop
- net start
-net disable
-sc config - Correct Answer sc config