Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?
A
Shredding documents helps prevent:
B
Explanation:
Reference: http://technet.microsoft.com/en-us/library/cc875841.aspx
Malicious software designed to collect personally identifiable information is referred to as :
A
The name of a particular wireless LAN that is broadcast on a network is referred to as a:
D
HOTSPOT You are at school and logged in to a Windows 7 computer using a standard user account.
You need to change some of the properties of a desktop icon for an assignment. Your instructor provides you with an
administrator username and password and asks you to do two tasks.
When you open the Need Admin Access Properties window, you see the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one
point.
Hot Area:
Which enables you to change the permissions on a folder?
D
HOTSPOT
Alice sends her password to the game server in plaintext. Chuck is able to observe her password as shown in the following
image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one
point.
Hot Area:
Password history policies are used to prevent:
D
Explanation:
This security setting determines the number of unique new passwords that have to be associated with a user account before
an old password can be reused. The value must be between 0 and 24 passwords.
This policy enables administrators to enhance security by ensuring that old passwords are not reused continually.
Reference: http://technet.microsoft.com/en-us/library/cc758950(v=ws.10).aspx
The reason for implementing Service Set IDentifier (SSID) masking is to:
B
You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an
Active Domain.
You need to push out an internal certificate to Internet Explorer on all workstations.
What is the quickest method to do this?
A
What is an example of non-propagating malicious code?
A
HOTSPOT
You are configuring the network settings of computers in your schools computer lab.
Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Explanation:
Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data sent
over an Internet Protocol network.
References:
https://en.wikipedia.org/wiki/IPsec
What are two examples of physical site security? (Choose two.)
A B
You want to prevent external users from acquiring information about your network. You should implement a:
C
You manage 50 Windows workstations in a computer lab. All workstations belong to the lab Active Directory domain.
You need to implement several audit policies on each workstation in the shortest time possible.
What should you do?
B
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/networking/branchcache/deploy/use-grouppolicy-to-configure-
domain-member-client-computers