1.
A biometric fingerprint scanner is an example of which of the following?
Correct Answer
D. Single-factor authentication
Explanation
A biometric fingerprint scanner is an example of single-factor authentication because it relies solely on the unique physical characteristic of a person's fingerprint to verify their identity. It does not require any additional factors such as a password or security token.
2.
A user ID, PIN, and a palm scan are all required to authenticate a system. Which of the following
is this an example of?
Correct Answer
B. B. Two-factor authentication
Explanation
This scenario is an example of two-factor authentication because it requires the user to provide two different types of credentials to authenticate the system. The user ID and PIN serve as the first factor, while the palm scan serves as the second factor. This adds an extra layer of security as it combines something the user knows (PIN) with something the user has (palm scan) to verify their identity.
3.
Which of the following would be disabled to prevent SPIM?
Correct Answer
C. C. Instant messaging
Explanation
To prevent SPIM (Spam over Instant Messaging), disabling instant messaging would be an effective measure. SPIM refers to unsolicited and unwanted messages sent through instant messaging platforms. By disabling instant messaging, organizations can reduce the risk of receiving spam messages and protect their network from potential security threats. Disabling P2P, ActiveX controls, or internet mail may have other security benefits but would not specifically address the issue of SPIM.
4.
A user sees an MD5 hash number beside a file that they wish to downloaD. Which of the following
BEST describes a hash?
Correct Answer
D. D. A hash is a unique number that is generated based upon the files contents and should be
verified after downloaD.
Explanation
A hash is a unique number that is generated based upon the files contents and should be verified after downloading. This means that the hash is calculated using an algorithm that takes into account the entire file, creating a unique value that can be used to verify the integrity of the file. By comparing the hash of the downloaded file with the original hash, the user can ensure that the file has not been tampered with or corrupted during the download process.
5.
According to a good disaster recovery plan, which of the following must happen during a power
outage before an uninterruptible power supply (UPS) drains its battery?
Correct Answer
B. B. The backup generator activates.
Explanation
During a power outage, an uninterruptible power supply (UPS) is designed to provide temporary power until a backup generator activates. This ensures that there is continuous power supply to critical systems and prevents any disruption or loss of data. Therefore, the correct answer is B. The backup generator activates.
6.
Which of the following would give a technician the MOST information regarding an external attack
on the network?
Correct Answer
C. C. NIDS
Explanation
A Network Intrusion Detection System (NIDS) would provide the technician with the most information regarding an external attack on the network. NIDS is designed to monitor network traffic and detect any suspicious or malicious activity. It can analyze packets of data, identify patterns or signatures of known attacks, and generate alerts or reports. This allows the technician to have a comprehensive view of the network and gain insights into potential threats or breaches. The other options, such as an internet content filter, proxy server, or firewall, may provide some level of protection or filtering, but they do not offer the same level of detailed information about external attacks.
7.
Which of the following would BEST prevent night shift workers from logging in with IDs and
passwords stolen from the day shift workers?
Correct Answer
B. B. Time of day restriction
Explanation
Time of day restriction would be the best solution to prevent night shift workers from logging in with IDs and passwords stolen from the day shift workers. By restricting access to certain hours of the day, it ensures that only authorized individuals are able to log in during the night shift. This prevents anyone with stolen credentials from using them during unauthorized times. Other options such as account expiration, account lockout, and domain password policy may provide some level of security, but they do not specifically address the issue of stolen credentials being used during the night shift.
8.
Which of the following would BEST ensure that users have complex passwords?
Correct Answer
B. B. Domain password policy
Explanation
A domain password policy is the best way to ensure that users have complex passwords. This policy can enforce requirements such as minimum length, use of special characters, and regular password changes. By implementing a domain password policy, organizations can ensure that users are using strong passwords that are difficult to guess or crack, thereby enhancing the security of their systems and data.