Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

Modulo: Comunicacin Activa en Ingles

Quiz: Training for MTA Certification


Axcel Jason Santiago Ventura
Quiz started on November 20, 2014 at 4:17:41 pm
Elapsed time 45 min
Were Presented 124 questions of 124 planned.
Correct answers: 124 (100%)
100 points out of 100
Question 1
The purpose of a User Account Control (UAC) is:
Correct answer:
software limit privileges.
Question 2
What two characteristics recommended for the domain password for a user? (Choose two.)
Correct answer:
Make it easy to remember
Question 3
By using the principle of least privilege, which of the following actions should allow users to do first?
Correct answer:
send an email
Question 4
The main purpose of a Network Access Protection (NAP) is avoided:
Correct answer:
Systems that do not meet the requirements to connect to a network
Question 5
Which of the following options and allows a user to connect securely to a corporate network through the Internet?
Correct answer:
Virtual Private Network (VPN)

Question 6
Which of the following shows the level of user access to a particular file or folder on the server?
Correct answer:
the effective permissions of the object
Question 7
Install uninterruptible power your servers is an example of application:
2

Modulo: Comunicacin Activa en Ingles


Correct answer:
availability.
Question 8
Role separation server Improves security by:
Correct answer selected:
Necessary only installing operating system components
Question 9
You must install a domain controller in a branch office. In addition, to protect the information of the domain controller.
Could not physically protect the server. What should you implement?
Correct answer:
Layer 2 Tunnel Protocol (L2TP).
Question 10
what is the primary advantage of using Active Directory Integrated Zones?
Correct answer:
secure replication
Question 11
Which of the following provides the highest level of security on a firewall?
Correct answer:
packet filtering
Question 12
A brute force attack:
Correct answer:
try all possible variations of passwords
Question 13
A malicious user to intercept and modify communications known as:
Correct answer selected:
"Man -in -the-middle"
Question 14
A network sniffer is a software or hardware:
Correct answer selected:
It captures and analyzes network communication
Question 15

Modulo: Comunicacin Activa en Ingles


You have two servers that run Windows Server. All units from both servers are formatted using NTFS. You move a file
from one server to another. The file permissions on the new location:
Correct answer:
inherit the destination folder of premisos
Question 16
What is the safest method to transfer documents?
Correct answer:
Media encryption.
Question 17
A chip Trusted Platform Module (TPM) is a microprocessor that:
Correct answer:
stored cryptographic keys
Question 18
In Internet Explorer 8 InPrivate Browsing feature prevents:
Correct answer:
stored on the computer any data of the session
Question 19
A common means of infection is:
Correct answer:
Attachments in an email
Question 20
a person asks for your password. This is an example of:
Correct answer:
social engineering
Question 21
Must give a set of users read-only access to a file from a shared resource red- must add users to:
Correct answer:
When Guests group
Question 22
Avoid physically protected servers:
Correct answer selected:
theft.
Question 23
4

Modulo: Comunicacin Activa en Ingles


Malicious software designed to collect personal identifying information is called:
Correct answer:
spyware
Question 24
Want to prevent external users to acquire information about your network. You must implement:
Correct answer:
a firewall
Question 25
Must be able to follow up on your access file. What type of audit should be implemented?
Correct answer selected:
Access to the object.
Question 26
Which of the following allows you to change the permissions of a folder?
Correct answer:
Edit.
Question 27
Services or programs within a computer system that can be exploited by unauthorized users is called:
Correct answer:
Size of attack
Question 28
The purpose of a digital certificate is to verify that:
Correct answer:
public key belongs to the sender.
Question 29
Your company requires users to enter a string to access the wireless network. This series must meet the following
requirements: Containing more than 15 characters contain at least one letter Contain at least one number contain at least
one symbol What security technology meets these requirements?
Correct answer:
WPA2 PSK
Question 30
An email with digital signature:
Correct answer:
validates the sender

Modulo: Comunicacin Activa en Ingles


Question 31
When the address bar shows a padlock, What it is?
Correct answer:
It is safe and reliable
Question 32
The main purpose of a firewall is:
Correct answer:
filter communications between entities
Question 33
Establish a database is a read-only application example:
Correct answer selected:
accessibility.
Question 34
Must be able to follow up on your access file. What type of audit should be implemented?
Correct answer:
File Permissions
Question 35
DDSSec DNS protects communications by adding: (Choose two.)
Correct answer:
Data Integrity
Question 36
RADIUS is for the purpose of:
Correct answer:
provide centralized authentication
Question 37
A physical device designed to collect passwords without the user's knowledge is called:
Correct answer selected:
keylogger.
Question 38
The password history policies are used to avoid:
Correct answer selected:
passwords to be used again immediately
Question 39
6

Modulo: Comunicacin Activa en Ingles


cookies compromise security by allowing: (pick two)
Correct answer:
storing website passwords
Question 40
A brute force attack:
Correct answer:
try every possible password variations.
Question 41
a common vector virus infection is
Correct answer selected:
e-mail attachments
Question 42
Which two of the following are included in the Business community antivirus program? (Choose two.)
Correct answer:
Analysis on demand
Question 43
obtains data from footprinting maliciosly
Correct answer:
DNS zones
Question 44
How IPSec protects communications?
Correct answer:
Encrypting the data payload.
Question 45
Your company has a publicly accessible web server. The server should be located:
Correct answer:
In a perimeter network
Question 46
The primary purpose of a safety audit is automatic:
Correct answer:
determine compliance
Question 47
Set a minimum password age limits the time in which a user can:
7

Modulo: Comunicacin Activa en Ingles


Correct answer selected:
change passwords
Question 48
Microsoft Baseline Security Analyzer scans systems for
Correct answer:
missing security updates
Question 49
You must configure all servers in a domain to the correct time for:
Correct answer:
correlate events after attack
Question 50
DNSSec protects communications by adding DNS (Choose two):
Correct answer:
data integrity.
Question 51
to protect a network from an attack of type "man-in-the-middle" .debe implement:
Correct answer:
network address translation (NAT)
Question 52
Transmit unencrypted passwords makes them vulnerable to interception:
Correct answer:
a packet sniffer.
Question 53
What technology allows you to filter communications between a program and the Internet?
Correct answer selected:
Firewall Software
Question 54
How can you confirm whether a computer on your network is the target of a brute force attack?
Correct answer:
To check the security log for failed authentication attempts
Question 55
A virtual private network (VPN) is:
Correct answer:
8

Modulo: Comunicacin Activa en Ingles


A tunnel that prevents communication that passes through the modifying or stolen
Question 56
Why would implement VLANs? (Choose two reasons)
Correct answer:
to separate the hosts on the same network without increasing the overhead
Question 57
You should restrict a domain account access to the control panel. What should you use?
Correct answer:
Group Policy Objects.
Question 58
The purpose of a honeypot is:
Correct answer:
attract hackers to a specific system
Question 59
A virus that spreads automatically be demonima:
Correct answer:
a worm
Question 60
Destroying documents helps prevent:
Correct answer:
social engineering
Question 61
You should limit the permissions of a user on your client computer. In addition, you must grant permission to run a
program as administrator. How to configure access to the program to achieve this?
Correct answer:
By using RunAs
Question 62
Which of the following allows access to all the features of the user logged on a computer?
Correct answer:
Active X Controls
Question 63
The multi-factor authentication requires:
Correct answer:
9

Modulo: Comunicacin Activa en Ingles


two or more different user authentication methods
Question 64
Your anti-spam software blocks emails from a particular sender. Your company needs electonica receive emails from that
sender. What should you do?
Correct answer:
Add the email address to the whitelist.
Question 65
An attack that reduces the availability of a resource team is called:
Correct answer:
Denial of service
Question 66
The primary purpose of a safety audit is:
Correct answer selected:
Determine compliance
Question 67
the reason for implementing the mask indenfiticador Service Set (SSID) is
Correct answer selected:
concealment unknown wireless network equipment
Question 68
Kerberos avoids:
Correct answer selected:
attacks reproduction.
Question 69
Implement a system for wireless intrusion prevention:
Correct answer selected:
Prevent unauthorized wireless access
Question 70
It has a Windows Server 2008 domain using default security settings. A user tries to login with the wrong password more
than five times. Automatically, the user account:
Correct answer:
is blocked
Question 71
The process of the location of servers in a separate collision domain is called:
10

Modulo: Comunicacin Activa en Ingles


Correct answer:
network isolation
Question 72
The basic security questions used to reset a password are susceptible to:
Correct answer:
social engineering
Question 73
Passwords that contain recognizable words are vulnerable to:
Correct answer:
A dictionary attack
Question 74
The purpose is to provide RADIUS:
Correct answer:
Provide centralized authentication
Question 75
Windows Server Update Services (WSUS) is a tool That
Correct answer:
Manages updates for Microsoft software
Question 76
e-mail bombing attacks by a specific entity
Correct answer selected:
sending high volumes of e-mail
Question 77
Explore the Internet with Internet Explorer. Address bar changes as shown below. https: // www.woodgrovebank .com /
This indicates that the website:
Correct answer:
It is safe and reliable
Question 78
Phishing aims:
Correct answer:
information by pretending to be a trustworthy entity
Question 79
to prevent users from copying data on removable media, you must:
11

Modulo: Comunicacin Activa en Ingles


Correct answer:
apply a Group Policy
Question 80
Would implement a system of prevention of wireless instrucion for:
Correct answer:
prevent unauthorized wireless access.
Question 81
What is a minimum requirement to implement Network Access Protection (NAP) in a windows environment?
Correct answer:
Servers running Windows Server 2008 or a later version.
Question 82
The default length of the password to a domain controller Windows Server is:
Correct answer selected:
14
Question 83
Encrypting a file prevents:
Correct answer selected:
aya unauthorized access.
Question 84
The client computers on your network are stable and do not need any new features. What is the benefit of applying
operating system updates to those customers?
Correct answer selected:
Obstructing existing vulnerabilities

Question 85
Which of the following protocols communities figure while a user browses the Internet?
Correct answer:
HTTPS
Question 86
What is the safest method for a wireless network?
Correct answer:
WPA2 Enterprise

12

Modulo: Comunicacin Activa en Ingles


Question 87
Biometrics is used to:
Correct answer:
authenticate users.
Question 88
He works for a helpdesk for a major corporation. A user requests a password change. What should you do first?
Correct answer:
Verify user identity
Question 89
You should use access control lists to prevent certain users from accessing files on a computer. What file system should I
use?
Correct answer:
NTFS
Question 90
Filtering Media Access Control (MAC) allows you to:
Correct answer:
limit access to the network as a function of the network adapter of the client computer
Question 91
When a security audit is performed, the first step is:
Correct answer selected:
Make an inventory of technology assets of the company
Question 92
It is a network administrator. All computers are running Internet exploret 8. Must protect users against phishing. Which of
these options apply deves?
Correct answer:
SmartScreen Filter.
Question 93
Account is blocked if a user does the following repeatedly:
Correct answer:
Having errors in the authentication login
Question 94
Encrypt a hard drive is an example of application:
Correct answer:
confidentiality.
13

Modulo: Comunicacin Activa en Ingles


Question 95
The purpose of Microsoft Baseline Security Analyzer is to:
Correct answer selected:
list all possible application vulnerabilities.
Question 96
In what three objects in the file system you can set NTFS permissions?
Correct answer selected:
records
Question 97
Kerberos avoids:
Correct answer:
attacks reproduction.
Question 98
Receive an e-mail asking you to confirm your bank account. The email includes a link to the website of your bank as
shown below: https: / / www. woodgrobebank .com / loginscript / user2.jsp is very likely that this mail Address is:
Correct answer:
an e-mail phishing.
Question 99
To which two of the following vulnerabilities exposed the client in a wireless network?
Correct answer selected:
spying
Question 100
software designed to infiltrate or damage a computer without the user's consent is called:
Correct answer:
malware
Question 101
You must install a domain controller in a branch office. In addition, to protect the information of the domain controller.
There can physically secure the server What should you implement?
Correct answer:
Protocol Point to Point Tunneling Protocol (PPTP)

Question 102
Before implementing Network Access Protection (NAP), you must install:
14

Modulo: Comunicacin Activa en Ingles


Correct answer selected:
Routing and Remote Access
Question 103
You should hide internal IP addresses and Internet, while maintaining customer access to the Internet. Which of these
should you implement?
Correct answer:
Network Address Translation (NAT)
Question 104
Attempts to establish communications between a client computer or server. The server is not responding. Confirms that
the client and server have network connectivity. What should be checked below?
Correct answer:
windows firewall.
Question 105
You have an application that communicates using a plain text. Want to protect communications between the application
and a server. What should you implement?
Correct answer selected:
SSL
Question 106
to a server in a perimeter network is accessible, you should:
Correct answer:
use the windows firewall
Question 107
Must prevent unauthorized users from reading a specific file on a laptop if it was stolen.
Correct answer:
Encrypting File System (EFS)
Question 108
Which two of the following security settings are controlled by Group Policy? (Choose two.)
Correct answer:
Automatic File Locking
Question 109
Suspect that a user's computer is infected with virus. What should you do first?
Correct answer selected:
disconnect the computer from the network

15

Modulo: Comunicacin Activa en Ingles

Question 110
The purpose of BitLocker is:
Correct answer selected:
encrypt a drive
Question 111
You receive an email from a friend who asks you to delete a system file What should you do to him?
Correct answer:
Warn your friend to send mail spoofing
Question 112
The Network Access Protection (NAP) enables administrators to control access to network resources by:
Correct answer:
equipment warranty
Question 113
A particular wireless LAN that is broadcast on a network is called. . .
Correct answer:
Wireless Access Point (WAP)
Question 114
Which of the following is a special folder permission?
Correct answer selected:
Clear.
Question 115
Which of these vulnerable security threats is a laptop?
Correct answer selected:
theft
Question 116
To prevent users from copying data on removable media, you must:
Correct answer:
apply a Group Policy
Question 117
In a security context, the term "impersonation" means:
Correct answer:
theft
16

Modulo: Comunicacin Activa en Ingles


Question 118
You should limit the programs that run on the client computers to a specific list what technology should be implemented?
Correct answer selected:
AppLocker Group Policy

Question 119
A user group has access to the folder and all its contents. You should avoid any of the users get access to subfolder in
folder What should the subfolder?
Correct answer:
Block inheritance
Question 120
The certificate of a secure public Internet web server must:
Correct answer:
issued by a public certification authority (CA).
Question 121
E-mail attachments from an unknow source Received Should be
Correct answer:
scanned for viruses
Question 122
What is the minimum requirement to create through BitLocker-To-Go on a client computer?
Correct answer:
Windows 7 Enterprise Edition
Question 123
The process of the location of servers in a separate collision domain is called:
Correct answer selected:
Network isolation
Question 124
Many websites that you visit require a username and password How to manage these passwords?
Correct answer selected:
You should store them in an encrypted file

17

You might also like