Monday, August 23, 2021

cisco Chapter-7 quiz (answer in Bold)

A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provide justification for the request. What three reasons can the user use to justify the request? (Choose three.)
Select one or more:
the ability of users to select updates
no opportunities for users to circumvent updates
the ability to control when updates occur
the need for systems be directly connected to the Internet
the likelihood of storage savings
the ability to obtain reports on systems

Feedback

Question 2

Correct
Mark 2.00 out of 2.00
Flag question

Question text

What are three types of power issues that a technician should be concerned about? (Choose three.)
Select one or more:
blackout
fuzzing
spike
spark
flicker
brownout

Feedback

Question 3

Correct
Mark 2.00 out of 2.00
Flag question

Question text

The manager of a department suspects someone is trying to break into computers at night. You are asked to find out if this is the case. What logging would you enable?
Select one:
Windows
operating system
audit
syslog

Feedback

Question 4

Correct
Mark 2.00 out of 2.00
Flag question

Question text

The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.)
Select one or more:
backup
password management
EFS
USB stick
at least two volumes
TPM

Feedback

Question 5

Correct
Mark 2.00 out of 2.00
Flag question

Question text

Why should WEP not be used in wireless networks today?
Select one:
its lack of encryption
its lack of support
easily crackable
its age
its use of clear text passwords

Feedback

Question 6

Correct
Mark 2.00 out of 2.00
Flag question

Question text

The company has many users who telecommute. A solution needs to be found so a secure communication channel can be established between the remote location of users and the company. What is a good solution for this situation?
Select one:
VPN
T1
fiber
PPP
modem

Feedback

Question 7

Correct
Mark 2.00 out of 2.00
Flag question

Question text

What is the difference between an HIDS and a firewall?
Select one:
An HIDS blocks intrusions, whereas a firewall filters them.
An HIDS monitors operating systems on host computers and processes file system activity. Firewalls allow or deny traffic between the computer and other systems.
A firewall performs packet filtering and therefore is limited in effectiveness, whereas an HIDS blocks intrusions.
A firewall allows and denies traffic based on rules and an HIDS monitors network traffic.
An HIDS works like an IPS, whereas a firewall just monitors traffic.

Feedback

Question 8

Correct
Mark 2.00 out of 2.00
Flag question

Question text

Why is WPA2 better than WPA?
Select one:
reduced keyspace
reduced processing time
supports TKIP
mandatory use of AES algorithms

Feedback

Question 9

Correct
Mark 2.00 out of 2.00
Flag question

Question text

Companies may have different operation centers that handle different issues with the IT operations. If an issue is related to network infrastructure, what operation center would be responsible?
Select one:
NOC
HR
HVAC
SOC

Feedback

Question 10

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A company wants to implement biometric access to its data center. The company is concerned with people being able to circumvent the system by being falsely accepted as legitimate users. What type of error is false acceptance?
Select one:
CER
Type I
false rejection
Type II

Feedback

Question 11

Correct
Mark 2.00 out of 2.00
Flag question

Question text

An intern has started working in the support group. One duty is to set local policy for passwords on the workstations. What tool would be best to use?
Select one:
password policy
secpol.msc
system administration
grpol.msc
account policy

Feedback

Question 12

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A user is asked to analyze the current state of a computer operating system. What should the user compare the current operating system against to identify potential vulnerabilities?
Select one:
a vulnerability scan
a baseline
a whitelist
a blacklist
a pentest

Feedback

Question 13

Correct
Mark 2.00 out of 2.00
Flag question

Question text

An administrator of a small data center wants a flexible, secure method of remotely connecting to servers.Which protocol would be best to use?
Select one:
Remote Desktop
Secure Copy
Telnet
Secure Shell

Feedback

Question 14

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A user calls the help desk complaining that an application was installed on the computer and the application cannot connect to the Internet. There are no antivirus warnings and the user can browse the Internet. What is the most likely cause of the problem?
Select one:
computer firewall
permissions
need for a system reboot
corrupt application

Feedback

Question 15

Correct
Mark 2.00 out of 2.00
Flag question

Question text

The manager of desktop support wants to minimize downtime for workstations that crash or have other software-related issues. What are three advantages of using disk cloning? (Choose three.)
Select one or more:
ensures system compatibility
easier to deploy new computers within the organization
ensures a clean imaged machine
can provide a full system backup
creates greater diversity
cuts down on number of staff needed

Feedback

Question 16

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A user is proposing the purchase of a patch management solution for a company. The user wants to give reasons why the company should spend money on a solution. What benefits does patch management provide? (Choose three.)
Select one or more:
Updates cannot be circumvented.
Updates can be forced on systems immediately.
Patches can be chosen by the user.
Administrators can approve or deny patches.
Patches can be written quickly.
Computers require a connection to the Internet to receive patches.

Feedback

Question 17

Correct
Mark 2.00 out of 2.00
Flag question

Question text

Which three items are malware? (Choose three.)
Select one or more:
attachments
virus
Trojan horse
keylogger
email
Apt

Feedback

Question 18

Correct
Mark 2.00 out of 2.00
Flag question

Question text

Which service will resolve a specific web address into an IP address of the destination web server?
Select one:
DNS
ICMP
DHCP
NTP

Feedback

Question 19

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A user calls the help desk complaining that the password to access the wireless network has changed without warning. The user is allowed to change the password, but an hour later, the same thing occurs. What might be happening in this situation?
Select one:
password policy
user error
user laptop
rogue access point
weak password

Feedback

Question 20

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A new PC is taken out of the box, started up and connected to the Internet. Patches were downloaded and installed. Antivirus was updated. In order to further harden the operating system what can be done?
Select one:
Disconnect the computer from the network.
Remove the administrator account.
Remove unnecessary programs and services.
Install a hardware firewall.
Turn off the firewall.
Give the computer a nonroutable address.

Feedback

Question 21

Correct
Mark 2.00 out of 2.00
Flag question

Question text

After a security audit for an organization, multiple accounts were found to have privileged access to systems and devices. Which three best practices for securing privileged accounts should be included in the audit report? (Choose three.)
Select one or more:
Enforce the principle of least privilege.
Only managers should have privileged access.
Reduce the number of privileged accounts.
Secure password storage.
Only the CIO should have privileged access.
No one should have privileged access.

Feedback

No comments:

Post a Comment

cisco Cybersecurity Essentials Quiz 8 answer in bold

Question  1 Correct Mark 2.00 out of 2.00 Flag question Question text A company has had several incidents involving users downloading unauth...