Ch 16 5 A Day_1(Hector)

advertisement
Cisco Chapter 16: Advanced Security
5 A Day (part 1)
Name: ________________________________________________
1. Which issue should be addressed in the detailed information that is provided by a local security policy?
the priority of services to be restored after an emergency is over
2. What are two interrelated aspects that would be involved in the physical security of an organization?
interstucture and network access
3. Which two factors should management consider when developing a security policy?
expense and cost
4. Why would security application software be implemented on a network?
to protect the OS
5. Which two hashing algorithms are used to ensure that messages are unaltered during transmission?
SHA or MD5
6. Which data security technology takes the form of an object which must be close to a computer before the user
can successfully submit a username and password?
security key fob
7. Which physical security technology uses an embedded integrated circuit chip to store data safely and is
commonly used in secure ID badges?
a smart card
8. Which two advantages are attributed to a hardware firewall when compared to a software firewall ?
it doesn’t task your processor
it can protect more than one computer
9. Why should the default username and password be changed as soon as an access point is powered on and
accessed?
The change provides a minimum level of security to the access point
10. A customer has a web server for a small business. The business uses both wired and wireless networking. A
Linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled
in order for customers to gain access to the web server from their remote locations?
MAC address
11. What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding
neighbors?
Disable the SSID broadcast
12. What is a feature of the firewall capability when Windows Vista is the operating system?
The firewall can be managed manually by permitting or allowing specific points
13. Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
Users accessing the network using a dial-up connection used to control when the updates are downloaded and installed
14. Which Windows XP command initiates a backup from the command line?
nt/backup
15. What are two features of Windows Vista Backup?
the back-up files have the extension and the backup files can be saved to another connected computer or
server
16. After a technician collects information from the computer, which two sources can provide the technician with
possible solutions for various types of network-related problems?
the manufacturer FAQ for network devices and network device logins
17. A user reports that the antivirus software on a computer is always turned off when the computer is restarted,
despite being reactivated each time the computer starts up. Further investigation by the technician shows that
the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
the computer has been infected with spyware
18. A network administrator is trying to change the account name of a user but cannot make the changes. What
could be a possible cause?
the network administrator doesn’t have access to the user account
19. After logging into a computer, a user is unable to access the CIW folder. Access to this folder is necessary to
complete an assignment. Which two actions can the administrator take to provide the user access to the folder?
Give the person rights to CIW folder and add the user to a group that has the rights to the CIW folder.
20. Which important feature is offered by the USB standard?
It offers rates of around 560 Mb/sec in low0speed mode
Download