You are on page 1of 10

0000Cisco exam

1 How can web tools, such as Java or ActiveX, be used for a malicious attack?
by altering the interactivity level of a web page

by creating popup windows

by causing the web browser to crash, leaving the system vulnerable

by installing unwanted programs on a computer

9.2.2 Explain web security

2 What does a malware detection program look for when running a scan?
a service pack

patterns in the programming code of the software on a computer


0 patches that prevent a newly discovered virus or worm from making a successful attack
mirror sites

9.4.1 Explain how to update signature files for anti-virus and anti-spyware software

3 Which feature is characteristic of adware?


It is a subset of spyware.

It is a harmful virus that can corrupt the entire data on the network.

It is displayed in popup windows, which open faster than the user can close them.

It sends out sensitive information to the attacker.

9.2.3 Define adware, spyware, and grayware

4 Which form of network protection is used as the basis of VPN?


data backup

data encryption

firewall protection

port protection

9.3.3 Describe ways to protect data

5 The IT manager of a bank is disposing of some computers, but the hard drives have some highly confidential data on them. What is the
recommended way of dealing with the drive to ensure that the data is irrecoverable?
Delete all files and folders.

Reformat the drive.

Use a utility that overwrites all the data on the drive.

Break the drive platters with a hammer.

9.2.8 Explain hardware deconstruction and recycling

6 An attacker sends a large number of requests to a server from several computers that are located at different geographical locations.
What is the name for this type of attack?
DDoS

DoS

e-mail bomb

ping of death

9.2.4 Explain Denial of Service


7 Which two file system security features are applicable to the NTFS file system? (Choose two.)
supports file and folder level encryption

supported by all versions of Windows from, and including, Windows 95

limited to 4 GB files size and a volume limit of 32 GB

number of files in a volume limited to 4.17 million

includes journaling

9.3.3 Describe ways to protect data

8 What is typically included in a service pack?


device drivers for nonstandard devices

hardware compatibility list

operating system upgrades and patches

virus definitions

9.4.2 Explain how to install operating systems service packs and security patches

9 What is a good practice to prevent an unauthorized user from guessing a password and accessing an account?
disabling account lockout status within the network

enabling a user account only after issuing a password to the user over the phone

locking out the account after a small, finite number of unsuccessful attempts

setting the user account password to be left blank for the first login

9.3.3 Describe ways to protect data

10 What is accomplished by a successful DoS attack?


It facilitates access to external networks.

It obstructs access to the specific target server.

It obtains all addresses in the address book within the server.

It stealthily scans the data on the target server.

9.2.7 Explain TCP/IP attacks

11 Which statement accurately describes the WEP standard?


WEP is a first generation security standard for wireless communication.

WEP is implemented using 16-bit encryption.

WEP provides better encryption and authentication than WPA provides.

WEP was created as a temporary solution until the implementation of 802.11i.

9.3.4 Describe wireless security techniques

12 What happens when a wireless access point (WAP) is configured to stop broadcasting the SSID?
No new connections can be accepted by the wireless access point.

The identity of the network is freely broadcast.

The network is invisible to those who are unaware of the SSID.

Signals are prevented from transmission outside the boundaries of the local network.

• 9.3.4 Describe wireless security techniques


• 16.3.1 Configure security settings

13 Which two technologies are used for authenticating users? (Choose two.)
biometrics

Event Viewer

secure DNS

smart card

UNC

9.3.2 Explain the tasks required to protect physical equipment

14 Which two devices are used for the sole function of protecting computer equipment from theft?
cable locks

card keys

security cages

smart card

security key fob

9.3.2 Explain the tasks required to protect physical equipment

15 Which two actions can be considered social engineering attacks? (Choose two.)
analyzing the products of a competitor company

obtaining the directory of a competitor company that contains the e-mail addresses of all the employees of that company

researching reviews and other articles about the performance of a competitor company

researching the website of a competitor company

searching for important documents on the desks of a competing company

9.2.6 Explain social engineering

16 Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time?
Secure by a security cable wrapped around the leg of the user's desk.

Put the laptop in a desk drawer in the locked office of the user.

Place the laptop in a locked security cage designed to store computer equipment.

Place the laptop in the office of the supervisor.

9.3.2 Explain the tasks required to protect physical equipment

17 What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
Download the latest signature files on a regular basis.

Schedule a scan once a week.

Schedule anti-virus updates using Windows Task Manager.

Follow the firewall configuration guidelines on the anti-virus manufacturer website.

9.4.1 Explain how to update signature files for anti-virus and anti-spyware software

18 Which three questions should be addressed by organizations developing a security policy? (Choose three.)
What items need to be protected?

How should the items be protected?

What is to be done in the case of a security breach?

When do the items need protecting?

What insurance coverage is required?

What are the possible threats to the items?


9.3.1 Explain what is required in a basic local security policy\

19 A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing
the updates?
Create a restore point.

Backup all the install disks.

Update the antivirus software.

Change the firewall rules to enable the installer to access port 8900 of the Microsoft server.

9.4.2 Explain how to install operating systems service packs and security patches

20 Which best practice should be included in a password protection policy?


Encourage users to document passwords in a personal file.

Enforce password protection at either the BIOS level or the network login level.

Passwords should contain a mixture of letters and numbers so that they cannot easily be broken.

Restrict passwords to text-based strings.

9.3.3 Describe ways to protect data

1 Which functionality is normally expected from adware?


It is installed on the computer by the user.

It is usually distributed with downloaded software.

It monitors activity on the computer and sends this information to the organization that launched it.

It prevents opening of extra windows on the computer without the consent of the user.

9.2.3 Define adware, spyware, and grayware

2 A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has
shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on the
network. Which type of TCP/IP attack did these attackers deploy?
denial of service

ping of death

replay

SYN flood

9.2.7 Explain TCP/IP attacks

3 An attacker has managed to decode the encrypted messages of a wireless network. The network uses Windows XP and Cisco
equipment. The security protocol that is used is WEP with 64-bit encryption. Which action can be recommended to the
technician for securing the network?
Advise users to store their network authentication data, such as their passwords, in a secure manner.

Configure Windows update to run automatically, at a convenient time and on a regular basis.

Recover all sensitive data from the computers of the network, destroy their hard drives, and recycle the computers.

Upgrade to the LEAP wireless security protocol.

• 9.3.4 Describe wireless security techniques


4 Which task is in the scope of responsibilities of a network technician working with security updates and patches?
submit a schedule to the manufacturer of when updates should be available

developing patches and updates

author signature files


installing patches and updates

• 9.4 Identify common preventive maintenance techniques for security


5 Which procedure would be a valid password lockout rule?
An account should be locked out after a specific number of unsuccessful login attempts.

A password should be locked from public view.

An account should be locked out after a random period of time.

A password should lock out a user from connecting to external networks

• 9.3.3 Describe ways to protect data


6 An employee of a bank asked the network administrator for advice about an e-mail that the employee had received. The e-mail asked
for the employee's username and password details to confirm the employee's identity in order to update details in a database. The
network administrator told the employee not to respond. Which type of security attack was the network administrator worried about?
adware attack

DDoS attack

phishing attack

virus attack

• 9.2.3 Define adware, spyware, and grayware


7 Which attack can be accomplished by using phishing techniques?
DDoS attack

e-mail bomb attack

ping-of-death attack

social engineering attack

• 9.2.3 Define adware, spyware, and grayware


8 Which two practices help prevent unauthorized access to a wireless network? (Choose two.)
disabling the broadcast of SSID

installing the WAP protocol

filtering the MAC addresses of computers

retaining the original firmware on all wireless devices

using 64-bit encryption as per the WEP standard

• 9.3.4 Describe wireless security techniques


9 What is the name given to code patterns of viruses?
grayware

mirrors

signatures

virus definition tables

• 9.4.1 Explain how to update signature files for anti-virus and anti-spyware software
10 When accessing a website, a user is overwhelmed by popup windows that open faster than the user can close them. What is
the most likely cause of this problem?
adware

phishing
spyware

Trojan

• 9.2.3 Define adware, spyware, and grayware


11 Which security device stores user physical characteristics to provide a user level of facility access?
a biometric sensor

a card key

a key fob

a smart card

• 9.3.2 Explain the tasks required to protect physical equipment


12 Which two procedures can help secure data backups? (Choose two.)
Only perform full backups.

Keep backup media off site.

Ensure that the responsibility for conducting backups is frequently changed among users.

Place a password on the backup.

Do the backup at the same time each day.

• 9.3.3 Describe ways to protect data


13

• 9.4.2 Explain how to install operating systems service packs and security patches
14 A company uses computers and wireless access points from a variety of different suppliers. Which wireless security protocol
should the company use to achieve the best level of security?
LEAP

WEP

WPA

WTLS

• 9.3.4 Describe wireless security techniques


15 Which precaution helps protect against social engineering in the workplace?
disclosing passwords to company personnel only

guiding visitors within the premises and escorting them personally when they leave

keeping hidden from public view any passwords that are posted in the work area

sharing access cards with other employees

• 9.2.6 Explain social engineering


16 In which type of attack are TCP ports randomly opened to overload the network with a large number of false requests?
e-mail bomb attack

replay attack

spoofing attack

SYN flood attack

• 9.2.7 Explain TCP/IP attacks


17 Which feature of WPA makes it suitable for configuring wireless security?
It disables SSID broadcasting, which prevents unauthorized users from accessing the network.

It encrypts the data that is broadcast between the wireless access point and the wireless clients.

It restricts computer access to a wireless access point.

It transmits signals only within the network area.

• 9.3.4 Describe wireless security techniques


18 A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the
user has never requested information. Which name is given to this type of e-mail?
spoof

adware

grayware

spam

• 9.2.5 Describe spam and popup windows


19 What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent
viruses?
Download the latest signature files on a regular basis.

Schedule a scan once a week.

Schedule anti-virus updates using Windows Task Manager.

Follow the firewall configuration guidelines on the anti-virus manufacturer website.

• 9.4.1 Explain how to update signature files for anti-virus and anti-spyware software
20 Which two actions improve security on a wireless network? (Choose two.)
Enable WEP.

Broadcast the default SSID.

Keep the default administrator password for the access point.

Enable MAC filtering.

• 9.3.4 Describe wireless security techniques

1 Which functionality is normally expected from adware?


It is installed on the computer by the user.

It is usually distributed with downloaded software.

It monitors activity on the computer and sends this information to the organization that launched it.

It prevents opening of extra windows on the computer without the consent of the user.

2 A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has
shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on the
network. Which type of TCP/IP attack did these attackers deploy?
denial of service

ping of death

replay

SYN flood

3 An attacker has managed to decode the encrypted messages of a wireless network. The network uses Windows XP and Cisco
equipment. The security protocol that is used is WEP with 64-bit encryption. Which action can be recommended to the technician for
securing the network?
Advise users to store their network authentication data, such as their passwords, in a secure manner.

Configure Windows update to run automatically, at a convenient time and on a regular basis.

Recover all sensitive data from the computers of the network, destroy their hard drives, and recycle the computers.

Upgrade to the LEAP wireless security protocol.

4 Which task is in the scope of responsibilities of a network technician working with security updates and patches?
submit a schedule to the manufacturer of when updates should be available

developing patches and updates

author signature files

installing patches and updates

5 Which procedure would be a valid password lockout rule?


An account should be locked out after a specific number of unsuccessful login attempts.

A password should be locked from public view.

An account should be locked out after a random period of time.

A password should lock out a user from connecting to external networks

6 An employee of a bank asked the network administrator for advice about an e-mail that the employee had received. The e-mail asked for
the employee's username and password details to confirm the employee's identity in order to update details in a database. The network
administrator told the employee not to respond. Which type of security attack was the network administrator worried about?
adware attack

DDoS attack

phishing attack

virus attack

7 Which attack can be accomplished by using phishing techniques?


DDoS attack

e-mail bomb attack

ping-of-death attack

social engineering attack

8 Which two practices help prevent unauthorized access to a wireless network? (Choose two.)
disabling the broadcast of SSID

installing the WAP protocol

filtering the MAC addresses of computers

retaining the original firmware on all wireless devices

using 64-bit encryption as per the WEP standard

9 What is the name given to code patterns of viruses?


grayware

mirrors

signatures
virus definition tables

10 When accessing a website, a user is overwhelmed by popup windows that open faster than the user can close them. What is the most
likely cause of this problem?
adware

phishing

spyware

Trojan

11 Which security device stores user physical characteristics to provide a user level of facility access?
a biometric sensor

a card key

a key fob

a smart card

12 Which two procedures can help secure data backups? (Choose two.)
Only perform full backups.
Keep backup media off site.

Ensure that the responsibility for conducting backups is frequently changed among users.

Place a password on the backup.

Do the backup at the same time each day.

13 A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded
successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown?
Notification for downloading available updates will be displayed when the computer is rebooted.

The update will be lost.

The update for the computer will be queued on the website.


The update will be installed as soon as the computer is powered on.

14 A company uses computers and wireless access points from a variety of different suppliers. Which wireless security protocol should the
company use to achieve the best level of security?
LEAP

WEP

WPA

WTLS

15 Which precaution helps protect against social engineering in the workplace?


disclosing passwords to company personnel only

guiding visitors within the premises and escorting them personally when they leave

keeping hidden from public view any passwords that are posted in the work area

sharing access cards with other employees

16 In which type of attack are TCP ports randomly opened to overload the network with a large number of false requests?
e-mail bomb attack
replay attack

spoofing attack

SYN flood attack

17 Which feature of WPA makes it suitable for configuring wireless security?


It disables SSID broadcasting, which prevents unauthorized users from accessing the network.

It encrypts the data that is broadcast between the wireless access point and the wireless clients.

It restricts computer access to a wireless access point.

It transmits signals only within the network area.

18 A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the
user has never requested information. Which name is given to this type of e-mail?
spoof

adware

grayware

spam

19 What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
Download the latest signature files on a regular basis.

Schedule a scan once a week.

Schedule anti-virus updates using Windows Task Manager.

Follow the firewall configuration guidelines on the anti-virus manufacturer website.

20 Which two actions improve security on a wireless network? (Choose two.)


Enable WEP.

Broadcast the default SSID.

Keep the default administrator password for the access point.

Enable MAC filtering.

You might also like