Q1. Which of the following is a set of rules that control the working environment of user accounts and computer accounts?
A. Mandatory Access Control
B. Access control list
C. Group Policy
D. Intrusion detection system
Answer: C
Q2. Which of the following is method that can be used to identify Internet software in Software Restriction Policies?
A. Restriction rule
B. Identification rule
C. Internet rule
D. Zone rule
Answer: D
Q3. Which of the following protocols is used to secure workstation and computer authentication across the network?
A. TCP/IP
B. Network Directory Access Protocol
C. Kerberos
D. Lightweight Directory Access Protocol
Answer: C
Q4. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Mark asked his team to be assured that they are on a secured website. What they will do?
A. Take a look for a padlock in the lower right corner of the browser and https:// in the address bar.
B. Provide protection against a Distributed Denial of Services attack.
C. Call a team member while behaving to be someone else for gaining access to sensitive information.
D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site.
Answer: A
Q5. Which of the following security features of IE 7+ helps determine whether a Web site is a legitimate site?
A. Protected mode
B. Pop-up blocker
C. Security zones
D. Phishing filter
Answer: D
Q6. Which of the following can be installed for ensuring that the domain is secure in the remote locations?
A. Read-Only domain controller (RODC)
B. Microsoft Baseline Security Analyzer
C. Windows Software Update Services
D. DNS dynamic update
Answer: A
Q7. Which of the following is a technique used to attack an Ethernet wired or wireless network?
A. ARP poisoning
B. DNS poisoning
C. Mail bombing
D. Keystroke logging
Answer: A
Q8. You work as a security manager for Company Inc. An individual is connecting to your corporate internal network over the Internet. You have to ensure that he is not an intruder masquerading as an authorized user. Which of the following technologies will you use to accomplish the task?
A. Two-factor authentication
B. IP address packet filtering
C. Intrusion detection system (IDS)
D. Embedded digital signature
Answer: A
Q9. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following will you use to prevent unauthorized changes to computers on the domain?
A. TCP/IP protocol
B. Kerberos
C. User Account Control (UAC)
D. Lightweight Directory Access Protocol
Answer: C
Q10. Which of the following viruses cannot be detected by signature-based antivirus?
A. Macro virus
B. Boot sector virus
C. MBR virus
D. Polymorphic virus
Answer: D