Practice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com)



Similar documents
Section 12 MUST BE COMPLETED BY: 4/22

Security. TestOut Modules

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Chapter 15: Computer and Network Security

Windows 7. Qing Liu Michael Stevens

70-685: Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician

Certified Secure Computer User

Managing Applications, Services, Folders, and Libraries

Windows Operating Systems. Basic Security

Certified Secure Computer User

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Medical Networks and Operating Systems

Training Guide: Configuring Windows8 8

Activity 1: Scanning with Windows Defender

Windows Embedded 7 E versus Windows Embedded 7 P

How to Encrypt your Windows 7 SDS Machine with Bitlocker

Installing and Configuring Windows 7 Client

Designing and Deploying Connected Device Solutions for Small and Medium Business

Smart TPM. User's Manual. Rev MD-STPM-1001R

Trend Micro OfficeScan Best Practice Guide for Malware

worldpay.com Understanding the 12 requirements of PCI DSS SaferPayments Be smart. Be compliant. Be protected.

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

Advanced Diploma In Hardware, Networking & Server Configuration

Accessing the SUNYIT wireless network for the first time

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana USA

Windows" 7 Desktop Support

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Business ebanking Fraud Prevention Best Practices

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Malware & Botnets. Botnets

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Did you know your security solution can help with PCI compliance too?

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

How to easily clean an infected computer (Malware Removal Guide)

Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

Chapter 4 Application, Data and Host Security

Beginning Windows 8. Mike Halsey Microsoft MVP for Windows. Apress*

Cyber Security Awareness

DriveLock and Windows 7

ICT Professional Optional Programmes

SQL Server Hardening

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Cyber Security Awareness

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows Vista (DARC) Matthew Cook

Encrypting with BitLocker for disk volumes under Windows 7

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Loophole+ with Ethical Hacking and Penetration Testing

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led

WiFi-SB-L3 300M WiFi Router WiFi Bridge WiFi Repeater. WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

Configuring Windows Server 2008 Active Directory

Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo

Wharf T&T Cloud Backup Service User & Installation Guide

Course Outline. ttttttt

Configuring and Administering Windows 7

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Sophos Computer Security Scan startup guide

Web Security School Final Exam

Course 50322B: Configuring and Administering Windows 7

Getting Started with Symantec Endpoint Protection

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

HP MediaSmart Server Software Upgrade from v.1 to v.3

Spyware Doctor Enterprise Technical Data Sheet

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

GFI White Paper PCI-DSS compliance and GFI Software products

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

PC Security and Maintenance

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Windows 7, Enterprise Desktop Support Technician

Get Success in Passing Your Certification Exam at first attempt!

MS MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp

Agency Pre Migration Tasks

information security and its Describe what drives the need for information security.

A+ Practical Applications Solution Key

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)

Best Practice Configurations for OfficeScan (OSCE) 10.6

Remote Deposit Terms of Use and Procedures

Dell ControlPoint Security Manager

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

DriveLock and Windows 8

Integrating a Hitachi IP5000 Wireless IP Phone

SecurEnvoy Security Server. SecurMail Solutions Guide

F-Secure Internet Security 2012

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

& INTERNET FRAUD

Transcription:

Practice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com) 1. Which command is used to access the local group policy editor for Windows 7? A. poledit.exe B. gpedit.msc C. local.msc D. grplocal.exe 2. A user receives an email stating that there has been an attempt to access their Ebay account. The email requests that the user select the link in the email and then reset their password. When they open the link, they are prompted to enter their old password before entering their new password, and then asked to confirm the new password. This is an example of which type of security threat? A. root kit B. worm C. phishing D. piggybacking 3. Which is the best practice to prevent phishing in the corporate environment? A. Installing a good antivirus program. B. Disable the autorun feature for the disc drive system. C. Set the Internet browser security setting to high. D. Educate the user. 4. Which is the quickest way to remove or counter a rootkit? A. Perform a clean install of the operating system. B. Scan the system registry and then restore default settings. C. Start the computer system in Safe Mode and then run a good antivirus program. D. Install and then run a good anti span tool.

5. Which is an example of a biometric security system? A. RFID chip. B. Photo ID worker badge. C. PIN card. D. Fingerprint scanner. 6. Which is the recommended minimal length of a secure password? A. 4 characters B. 8 characters C. 16 characters D. 24 characters 7. Which example is the strongest password? A. BobbyYoung12345 B. SecretPassword54321 C. $ecurepa$$word123 D. xcdexveaztq 8. Which is NOT a standard NTFS permission? A. Hide B. Full Control C. Modify D. Read & execute 9. Which Windows file system(s) can use EFS? A. FAT16 B. FAT32 C. NTFS. D Any Microsoft Windows compatible file system can use EFS.

10. Which editions of Windows 7 support Bitlocker? (select two) A. Windows 7 Home B. Windows 7 Professional C. Windows 7 Ultimate D. Windows 7 Enterprise 11. Which Windows 7 application is designed to protect a PC against spyware? A. Defender B. BitLocker C. Msconfig D. Firewall 12. Your company is using a software application provided by another organization over the Internet. The software application uses port 2323. What would you do to allow the employees of the organization to use the software application. A. Change Internet Explorer Security level from high to low. B. Establish a guest account for each local user to use only to access the software application from the other organization. C. Change each user s computer location from Private to Public. D. Configure the firewall for an exception for the specific software application. 13. Which Windows application would you use to see if there have been attempts by unauthorized person(s) to access a computer? A. Msconfig. B. Event Viewer C. Device Manager D. Internet Explorer

14. Which is the best way to eliminate or disable annoying messages that appear when a standard user attempts to make a change in the computer configuration of a Windows 7 system? A. Change the user account from standard to Administrator. B. Change the user account from standard to guest. C. Change the user account control settings to never notify. D. Change the Firewall setting from Public to Private location. 15. What are two advantages of using a virtual smart card in place of a physical smart card? (Select two answers.) A. A virtual smart card will provide better encryption. B. A virtual smart card is always available. C. A virtual smart card is more economical. D. A virtual smart card is much more secure than a physical smart card. 16. An unauthorized person entering a secure area by closely following an authorized employee through a locked door is an example of which type of security breech? A. Spoofing B. Mascarade. C. Tailgating D. Barn storming 17. Which is the best method to prevent unauthorized access to a wireless router from an unauthorized portable computer? A. Change the SSID B. Configure a MAC filter. C. Place the wireless router inside a secure closet. D. Use only 802.11N type devices.

18. Where is the TPM located on a computer system? A. On the motherboard. B. In the hard disk drive. C. Virtually located in RAM. D. On the network adapter. 19. What is multi-factor authentication? A. When two or more security measures are used such something you know and something you have. B. When two or more encryption keys are used to access a resource. C. When two persons are required to enter a facility. D. When encryption cypher key is run two or more times during the encryption process. 20. What would you do to restrict access to a specific folder to only a few select persons working in an office? A. Place the folder in a hidden directory and only tell specific people the location. B. Place the folder in a BitLocker drive and provide only specific people with the password. C. Set folder permissions to only allow specific persons to access the folder. D. Encrypt the folder and then place a copy in each person s Document folder.

Correct answers Practice test 220-802 Domain 2 Security 1. Which command is used to access the local group policy editor for Windows 7? B. gpedit.msc 2. A user receives an email stating that there has been an attempt to access their Ebay account. The email requests that the user select the link in the email and then reset their password. When they open the link, they are prompted to enter their old password before entering their new password, and then asked to confirm the new password. This is an example of which type of security threat? C. phishing 3. Which is the best practice to prevent phishing in the corporate environment? D. Educate the user. 4. Which is the quickest way to remove or counter a rootkit? A. Perform a clean install of the operating system. 5. Which is an example of a biometric security system? D. Fingerprint scanner. 6. Which is the recommended minimal length of a secure password? B. 8 characters 7. Which example is the strongest password? C. $ecurepa$$word123 8. Which is NOT a standard NTFS permission? A. Hide 9. Which Windows file system(s) can use EFS? C. NTFS.

10. Which editions of Windows 7 support Bitlocker? (select two) C. Windows 7 Ultimate D. Windows 7 Enterprise 11. Which Windows 7 application is designed to protect a PC against spyware? A. Defender 12. Your company is using a software application provided by another organization over the Internet. The software application uses port 2323. What would you do to allow the employees to use the software application from the organization? D. Configure the firewall for an exception for the software application 13. Which Windows application would you use to see if there have been attempts by unauthorized person(s) to access a computer? B. Event Viewer 14. Which is the best way to eliminate or disable annoying messages that appear when a standard user attempts to make a change in the computer configuration of a Windows 7 system? C. Change the user account control settings to never notify. 15. What are two advantages of using a virtual smart card in place of a physical smart card? (Select two answers.) B. A virtual smart card is always available. C. A virtual smart card is more economical. 16. An unauthorized person entering a secure area by closely following an employee through a locked door is an example of which type of security breech? C. Tailgating 17. Which is the best method to prevent unauthorized access to a wireless router from an unauthorized portable computer? B. Configure a MAC filter. 18. Where is the TPM located on a computer system? A. On the motherboard.

19. What is multi-factor authentication? A. When two or more security measures are used such something you know and something you have. 20. What would you do to restrict access to a specific folder to only a few select persons working in an office? C. Set folder permissions to only allow specific persons to access the folder.