100% CORRECT!!
D. Eavesdropping correct answers Which attack listens to network traffic of a computer
resource?
A. Resource gathering
B. Denial of service
C. ARP poisoning
D. Eavesdropping
E. Logic bomb
C. 7 correct answers The default password length for a Windows server domain controller is:
A. 14
B. 0
C. 7
D. 5
C. It translates public IP addresses to private addresses and vice versa. correct answers What
does NAT do?
A. It encrypts and authenticates IP packets.
B. It provides caching and reduces network traffic.
C. It translates public IP addresses to private addresses and vice versa.
D. It analyzes incoming and outgoing traffic packets.
A. Enforcing principle of least privilege correct answers Role separation improves server
security by:
A. Enforcing principle of least privilege.
B. Installing applications on separate hard disks.
C. Physically separating high security servers from other servers.
D. Placing servers on separate VLANs.
A. Disable the guest account
B. Rename the admin account correct answers The Graphic Design Institute hires you to help
them set up a server for their 20-person
team.
As a general practice of hardening the server, you start by performing which two tasks?
(Choose two.)
A. Disable the guest account.
B. Rename the admin account.
C. Remove the account lockout policy.
D. Format partitions with FAT32.
B. Captures and analyzes network communication correct answers A network sniffer is
software or hardware that:
A. Records user activity and transmits it to the server
B. Captures and analyzes network communication
C. Protects workstations from intrusions
,D. Catalogs network data to create a secure index
Eavesdropping
Alice should never send her password in plain text. correct answers Alice sends her password
to the game server in plain text.
Chuck is able to observe her password. What is Chuck doing?
A. Eavesdropping
B. Man in the middle
C. Denial of service
What should Alice never do?
A. Never send a plaintext password
B. Only send passwords in plaintext to well-known companies
C. Only send passwords in plaintext over the local network
A. Rainbow Table correct answers Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?
A. Rainbow table
B. Brute force
C. Spidering
D. Dictionary
A. Disable folder sharing correct answers A group of users has access to Folder A and all of
its contents.
You need to prevent some
of the users from accessing a subfolder inside Folder A.
What should you do first?
A. Disable folder sharing
B. Hide the folder
C. Change the owner
D. Block inheritance
D. Save them to an encrypted file correct answers Many Internet sites that you visit require a
user name and password.
How should you secure these passwords?
A. Save them to a text file
B. Enable session caching
C. Configure the browser to save passwords
D. Save them to an encrypted file
E. Reuse the same password
A. Routing correct answers Bridging is a process of sending packets from source to
destination on OSI layer 3. Select the correct answer if the underlined text does not make the
, statement correct. Select "No change is needed" if the underlined text makes the statement
correct.
A. Routing
B. Switching
C. Repeating
D. No change needed
A. Read-only Domain Controller correct answers You need to install a domain controller in a
branch office. You also need to secure the information on the domain controller. You will be
unable to physically secure the server. Which should you implement?
A. Read-Only Domain Controller
B. Point-to-Point Tunneling Protocol (PPTP)
C. Layer 2 Tunneling Protocol (L2TP)
D.Server Core Domain Controller
B. Spelling and grammar errors
C. Threats of losing service correct answers What are the two attributes that an email
message may contain that should cause a user to question whether the message is a phishing
attempt? (Choose two)
A. An image contained in the message
B. Spelling and grammar errors
C. Threats of losing service
D. Use of bold and italics
A. Service Set Identifier correct answers The WPA2 PreShared Key (PSK) is created by
using a password and salting it with the WPS PIN.
A. Service Set Identifier (SSID)
B. Admin password
C. WEP key
D. No change is needed
Radius server correct answers To implement WPA2 Enterprise, you would need a/an:
A. RADIUS server
B. SSL server
C. WEP server
D. VPN server
A. Disable unused services correct answers You are volunteering at an organization that gets
a brand new web server. To make the
server more secure, you should add a second administrator account.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.
A. Disable unused services
B. Enable LM authentication
C. Enable NTLM authentication