Q1. Which of the following works at the network layer and hides the local area network IP address and topology?
A. Network address translation (NAT)
B. MAC address
C. Hub
D. Network interface card (NIC)
Answer: A
Q2. Which of the following is a collection or list of user accounts or computer accounts?
A. Group
B. Active Directory
C. Domain
D. Public folder
Answer: A
Q3. Which of the following are types of password policies of Windows 7? Each correct answer represents a complete solution. Choose all that apply.
A. Store Password Using Reversible Encryption
B. Minimum Password Length
C. User Name Length
D. Password Must Meet Complexity Requirements
Answer: ABD
Q4. Mark works as a Security Administrator for TechMart Inc. The company has a Windows-based network. Mark has gone through a security audit for ensuring that the technical system is secure and protected. While this audit, he identified many areas that need improvement. He wants to minimize the risk for potential security threats by educating team members in the area of social engineering, and providing basic security principle knowledge and he also wants to stress the Con?dentiality, Integrity, and Availability triangle in his training. For this purpose, he plans to implement the principle of least privilege. In which of the following way, it will affect his team members?
A. They are required to ask administrator every time when they want to access resources.
B. They are granted with a smallest set of privileges to the resources
C. They are required to log on as administrator to have access to their resources
D. The current resource access of team members will not change.
Answer: B
Q5. Which of the following is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service?
A. PEAP
B. RADIUS
C. Kerberos
D. MS-CHAP v2
Answer: B
Q6. Which of the following is the layer in which encryption and decryption of data takes place?
A. Presentation layer
B. Session layer
C. Physical layer
D. Data-link layer
Answer: A
Q7. Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following can Mark use to minimize the spam amount that is hitting the Microsoft Exchange server of the company?
A. Enable reverse DNS lookup
B. Use Read-only Domain Controller
C. Add Sender Policy Framework
D. Permit User Account Control
Answer: A
Q8. Which of the following layers defines the mechanisms that allow data to be passed from one network to another?
A. Network layer
B. Session layer
C. Physical layer
D. Data-link layer
Answer: A
Q9. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement stronger authentication measures for the customers, as well as eliminate IT staff from logging on with high privileges. Mark has various options, but he is required to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges?
A. Secondary Logon-Run As
B. Security log
C. Hardware firewall
D. Encrypted network configuration
Answer: A
Q10. Which of the following is a broadcast domain created by a switch?
A. VLAN
B. MAN
C. DMZ
D. VPN
Answer: A