Security Pro Chapter 7

Exit

Question 1 of 1

  Time Left


0 [{"id":460316,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 21:03:36","updated_at":"2018-05-13 22:05:40","questionName":"You want to close all ports associated with NetBIOS on your network firewalls to prevent attacks\r\ndirected against NetBIOS. Which ports should you close?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":"NetBIOS uses the following ports:\r\n- TCP 135\r\n- TCP and UDP 137\r\n- TCP and UDP 138\r\n- TCP 139\r\nDHCP uses ports 67 and 68. SNMP uses ports 161 and 162. LDAP uses ports 389 and 636.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460291,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 20:49:16","updated_at":"2018-05-13 22:05:40","questionName":"When securing a newly deployed server, which of the following rules of thumb should be\r\nfollowed?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"The best rule of thumb when securing a system is to determine the unneeded services and their\r\ndependencies before altering the system. If you don't perform the research before altering the\r\nsystem, you may inadvertently disable an essential service or fail to disable a service with\r\nsignificant vulnerabilities.\r\nAltering a system without researching, performing a change and test method, or even blindly\r\ndisabling all services of a specific type are not reliable means to improve security on a system.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460060,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 17:45:59","updated_at":"2018-05-13 22:05:40","questionName":"Which of the following is undetectable software that allows administrator-level access?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":"A rootkit is a set of programs that allows attackers to maintain permanent, administrator-level,\r\nhidden access to a computer. A rootkit:\r\n\u2022 Is almost invisible software\r\n\u2022 Resides below regular antivirus software detection\r\n\u2022 Requires administrator privileges for installation, then maintains those privileges to allow\r\nsubsequent access\r\n\u2022 Might not be malicious\r\n\u2022 Often replaces operating system files with alternate versions that allow hidden access\r\nA worm is a self-replicating virus. A Trojan horse is a malicious program that is disguised as\r\nlegitimate or desirable software. A logic bomb is designed to execute only under predefined\r\nconditions and lays dormant until the predefined condition is met. Spyware is software that is\r\ninstalled without the user's consent or knowledge and designed to intercept or take partial control\r\nover the user's interaction with the computer.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460061,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 17:47:36","updated_at":"2018-05-13 22:05:40","questionName":"Which of the following are characteristics of a rootkit? (Select two.)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":"A rootkit is a set of programs that allows attackers to maintain hidden, permanent, administrator-\r\nlevel access to a computer. A rootkit:\r\n\u2022 Is almost invisible software\r\n\u2022 Resides below regular antivirus software detection\r\n\u2022 Requires administrator privileges for installation, then maintains those privileges to allow\r\nsubsequent access\r\n\u2022 Might not be malicious\r\n\u2022 Often replaces operating system files with alternate versions that allow hidden access\r\nSpyware collects various types of personal information, such as internet surfing habits and\r\npasswords, and sends the information back to its originating source. Adware monitors actions that\r\ndenote personal preferences, then sends pop-ups and ads that match those preferences. Both\r\nSpyware and adware can use cookies to collect and report a user's activities.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460059,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 17:44:36","updated_at":"2018-05-13 22:05:40","questionName":"Which is a program that appears to be a legitimate application, utility, game, or screensaver and\r\nperforms malicious activities surreptitiously?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":"A Trojan horse is a program that appears to be a legitimate application, utility, game, or\r\nscreensaver, but performs malicious activities surreptitiously. Trojan horses are very common on\r\nthe internet. To keep your systems secure and free from such malicious code, you need to take\r\nextreme caution when downloading any type of file from just about any site on the internet. If\r\nyou don't fully trust the site or service that is offering a file, don't download it.\r\nOutlook Express is an email client found on Windows. A worm is a type of malicious code similar\r\nto a virus. A worm's primary purpose is to duplicate itself and spread, while not necessarily\r\nintentionally damaging or destroying resources. ActiveX controls are web applications written in\r\nthe framework of ActiveX.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460054,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 17:41:52","updated_at":"2018-05-13 22:05:40","questionName":"What is the main difference between a worm and a virus?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":"A worm is a self-replicating program that uses the network to replicate itself to other systems. A\r\nworm does not require a host system to replicate.\r\nBoth viruses and worms can cause damage to data and systems, and both spread from system to\r\nsystem, although a worm can spread itself while a virus attaches itself to a host for distribution.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460301,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 20:53:57","updated_at":"2018-05-13 22:05:40","questionName":"For users who are members of the sales team, you want to force computers to use a specific\r\ndesktop background and remove access to administrative tools from the Start menu.\r\nWhich solution should you use?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":"Use Group Policy to control the desktop for groups of users or computers. For example, you can\r\nprevent access to specific desktop or Start menu features.\r\nAccount policies are specific Group Policy settings that control user passwords. Account\r\nrestrictions are settings applied in the user account that restrict login hours or computers. Use file\r\nscreens to control the types of files that can be saved within a folder.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460300,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 20:52:49","updated_at":"2018-05-13 22:05:40","questionName":"Which of the following solutions would you use to control the actions that users can perform on a\r\ncomputer, such as shutting down the system, logging on through the network, or loading and\r\nunloading device drivers?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":"Use Group Policy to control user rights. On a Microsoft system, a user right is a privilege or action\r\nthat can be taken on the system, such as logging on, shutting down the system, backing up the\r\nsystem, or modifying the system date and time.\r\nAccount policies are specific Group Policy settings that control user passwords. Account\r\nrestrictions are settings applied in the user account that restrict login hours or computers. Use\r\nNTFS permissions to control actions that users can perform on specific files or folders.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460308,"quiz_id":"23678","answer_id":null,"answerType_id":"2","created_at":"2018-05-13 20:59:55","updated_at":"2018-05-13 22:05:40","questionName":"Match the Group Policy type on the left with the function that it can perform on the right.","questionTimeSeconds":"0","questionTimeMinutes":"20","questionImagePath":null,"position":7,"explanation":"The default domain policy is separated into two areas, computer configuration and user\r\nconfiguration. Computer policies are applied as soon as the system is booted. User policies are\r\nnot applied until the user logs in. Computer policies include:\r\n- Software that should be installed on a specific computer\r\n- Scripts that should run at startup or shutdown\r\n- Password restrictions that must be met for all user accounts\r\n- Network communication security settings\r\n- Registry settings that apply to the computer (the HKEY_LOCAL_MACHINE subtree)\r\nUser policy settings include:\r\n- Software that should be installed for a specific user\r\n- Scripts that should run at login or logoff\r\n- Internet Explorer user settings (such as favorites and security settings)\r\n- Registry settings that apply to the current user (the HKEY_CURRENT_USER subtree)","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460058,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 17:43:16","updated_at":"2018-05-13 22:05:40","questionName":"A collection of zombie computers have been set up to collect personal information. What type of\r\nmalware do the zombie computers represent?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":"A botnet is a collection of zombie computers that are commanded from a central control\r\ninfrastructure and propagate spam or to collect usernames and passwords to access secure\r\ninformation.\r\nA logic bomb is malware that lies dormant until triggered. A Trojan horse is a malicious program\r\nthat is disguised as legitimate software. Spyware monitors the actions performed on a machine\r\nand then sends the information back to its originating source.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460310,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 21:01:06","updated_at":"2018-05-13 22:05:40","questionName":"Which of the following is a snap-in that allows you to apply a template or compare a template to\r\nthe existing security settings on your computer?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":"The Security Configuration and Analysis snap-in allows you to apply a template or compare a\r\ntemplate to the existing security settings on your computer. This snap-in can be used for auditing\r\nto see if security settings configured in the past have been changed. A good security practice is to\r\ncheck the security setting frequently (every day if possible) to ensure that the controls set are still\r\nin effect and the system stays hardened.\r\nYou can obtain templates from the NSA that have predefined security settings the NSA considers\r\nappropriate for various Windows operating systems (but is not like a snap-in, which can be run\r\nregularly). The Microsoft Management Console (MMC) snap-ins are used with many group policy\r\nobjects in Active Directory. There is no Active Directory Security Template snap-in.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460298,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 20:51:34","updated_at":"2018-05-13 22:05:40","questionName":"You have contracted with a vendor to supply a custom application that runs on Windows\r\nworkstations. As new application versions and patches are released, you want to be able to\r\nautomatically apply them to multiple computers.\r\nWhich tool is your best choice for accomplishing this task?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"Use Group Policy to distribute and install software updates. You must use Group Policy to install\r\nupdates to non-Microsoft software that is not supported with Windows Software Update Services\r\n(WSUS).\r\nWindows Software Update Services (WSUS) is a patch management tool that allows clients on a\r\nnetwork to download software updates from an internal WSUS server within their organization.\r\n\u2022 The WSUS server receives a list of available updates from Microsoft.\r\n\u2022 On the WSUS server, you identify allowed or required patches for your organization.\r\n\u2022 Clients download only approved patches from an internal WSUS server or directly from\r\nMicrosoft.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460297,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 20:50:15","updated_at":"2018-05-13 22:05:40","questionName":"Which of the following tools can you use on a Windows network to automatically distribute and\r\ninstall software and operating system patches on workstations? (Select two.)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"Windows Software Update Services (WSUS) is a patch management tool that allows clients on a\r\nnetwork to download software updates from an internal WSUS server in their organization.\r\n\u2022 The WSUS server receives a list of available updates from Microsoft.\r\n\u2022 On the WSUS server, you identify allowed or required patches for your organization.\r\n\u2022 Clients download only approved patches from an internal WSUS server or directly from\r\nMicrosoft.\r\nYou can also use Group Policy to distribute and automatically install patches. You must use Group\r\nPolicy to install updates to non-Microsoft software that is not supported with WSUS.\r\nUse the Security Templates snap-in to create and edit templates that enforce system security\r\nsettings. Use the Security Configuration and Analysis snap-in to compare the existing settings\r\nwith the template or to apply a template to a single device. Use Group Policy to automatically\r\napply security templates.","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460303,"quiz_id":"23678","answer_id":null,"answerType_id":"3","created_at":"2018-05-13 20:55:51","updated_at":"2018-05-13 22:05:40","questionName":"Arrange the Group Policy ojects (GPOs) in the order in which they are applied.","questionTimeSeconds":"0","questionTimeMinutes":"20","questionImagePath":null,"position":6,"explanation":"GPOs are applied in the following order:\r\n1. The Local Group Policy on the computer.\r\n2. GPOs linked to the domain that contains the user or computer object.\r\n3. GPOs linked to the organizational unit(s) that contain(s) the object (from the highest-level\r\nOU to the lowest-level OU).","question_score_id":null,"lang":"","questionAudioPath":null},{"id":460289,"quiz_id":"23678","answer_id":null,"answerType_id":"0","created_at":"2018-05-13 20:46:39","updated_at":"2018-05-13 22:05:40","questionName":"By definition, what is the process of reducing security exposure and tightening security controls?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"Hardening is the process of securing devices and software by reducing security exposure and\r\ntightening security controls.\r\nSocial engineering is the act of exploiting human nature by convincing someone to reveal\r\ninformation or perform an activity. Active scanning and passive reconnaissance are types of\r\nreconnaissance attacks.","question_score_id":null,"lang":"","questionAudioPath":null}]
460316
0
120
block

You want to close all ports associated with NetBIOS on your network firewalls to prevent attacks directed against NetBIOS. Which ports should you close?

Select the Correct Answers  

(0/0)












460291
0
120
none
460060
0
120
none
460061
0
120
none
460059
0
120
none
460054
0
120
none
460301
0
120
none
460300
0
120
none
460308
0
1200
none
460058
0
120
none
460310
0
120
none
460298
0
120
none
460297
0
120
none
460303
0
1200
none
460289
0
120
none