Mark is implementing security on his e-commerce site. He wants to ensure that a customer sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?
A. Packet filtering
B. Authentication
C. Firewall
D. Digital signature
Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?
A. F936.28A1.5BCD.DEFA
B. A3-07-B9-E3-BC-F9
C. 1011-0011-1010-1110-1100-0001
D. 132.298.1.23
Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address.
He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop
the Spam?
Each correct answer represents a complete solution. Choose all that apply.
A. Forward a copy of the spam to the ISP to make the ISP conscious of the spam.
B. Send an email to the domain administrator responsible for the initiating IP address.
C. Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.
D. Close existing email account and open new email account.
In which type of access control do user ID and password system come under?
A. Physical
B. Power
C. Technical
D. Administrative
Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?
A. A DNS Zone
B. An Intranet
C. A demilitarized zone (DMZ)
D. A stub zone
Which of the following is a valid IP address for class B Networks?
A. 172.157.88.3
B. 80.33.5.7
C. 212.136.45.8
D. 225.128.98.7
You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?
A. Shorten the timeout for connection attempts.
B. Place a honey pot in the DMZ.
C. Implement a strong password policy.
D. Implement network based antivirus.
This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.
A. Multipartite virus
B. Boot sector virus
C. File virus
D. Stealth virus
E. Polymorphic virus
You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)
A. Create a group policy object (GPO) and implement it to the domain. Configure a security policy on it. Give Administrators read-only permission on that GPO.
B. Create a separate OU for the Administrators to test the security settings.
C. Ask the assistant administrators to re-apply the security policy after the changes have been made.
D. Schedule the SECEDIT command to run on the client computers.
Which of the following categories of the network management model is used to detect and log network problems or device failures?
A. Fault Management
B. Configuration Management
C. Security Management
D. Performance Management