Q11. Which of the following is a disadvantage of using biometric identification?
A. It breaks the several firewall security rules.
B. It needs a new network configuration of the entire infrastructure.
C. It can be faked and will not be trusted by several organizations.
D. It is expensive and cannot be afforded by several organizations
Answer: D
Q12. Which of the following is a mechanism that allows authentication of dial-in and other network connections?
A. VPN
B. NTFS
C. RADIUS
D. Single Sign-On
Answer: C
Q13. Which of the following operating systems have Windows Security Health Agent (SHA) on computers and report their status to the Security Health Validator (SHV)? Each correct answer represents a complete solution. Choose three.
A. Windows 2000 Professional
B. Windows Vista Business
C. Windows XP Service Pack 3
D. Windows 7 Professional
Answer: BCD
Q14. Which of the following are the Internet Explorer security zones? Each correct answer represents a complete solution. Choose three.
A. Trusted sites
B. Internet
C. Local intranet
D. Extranet
Answer: ABC
Q15. Which of the following is a tool that can be used to evaluate the servers having vulnerabilities that are related to the operating system and installed software?
A. DNS dynamic update
B. Windows Software Update Services
C. Read-Only domain controller (RODC)
D. Microsoft Baseline Security Analyzer
Answer: D
Q16. By default, what level of security is set for the Local intranet zone?
A. High-Medium
B. Medium-Low
C. High
D. Low
Answer: B
Q17. Which of the following are required to enable for preventing the users from downloading and installing software from the Internet? Each correct answer represents a complete solution. Choose all that apply.
A. Software restriction policies
B. PTR record
C. User Account Control
D. Anti-Virus software
Answer: AC
Q18. Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network?
A. Protocol analyzer
B. WIPS
C. WLAN controller
D. Spectrum analyzer
Answer: B
Q19. Which of the following is a use of Microsoft Windows Malicious Software Removal Tool?
A. To gain unauthorized remote access to a computer and launch additional attacks.
B. To distribute itself automatically from one computer to another via network connections.
C. To remove the malware.
D. To perform repetitive or time-consuming task on a network.
Answer: C
Q20. Which of the following protocols transmits user credentials as plaintext?
A. CHAP
B. MS-CHAP v2
C. PAP
D. MS-CHAP
Answer: C