Section 12 Review
Unlock all answers in this set
Unlock answersquestion
12.1 Simulation
answer
Please review the simulations in 12.1
question
What are examples of strong passwords?
answer
ilOve2EatIceCr3am TuxP3nguinsRnOv3l
question
One of the Windows 7 workstations you manage has four user accounts defined on it. Two of the users are limited users while the third is an administrative user. The fourth account is the Guest user account which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system. What should you do to increase the security of this system?
answer
Disable the Guest account.
question
12.2 Simulation
answer
Please review the simulations in 12.2
question
You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time.
answer
Disable the network jacks in the reception area Train the receptionist to keep her iPad in a locked drawer when not in use.
question
One of the Windows 7 workstations you manage has three user accounts defined on it. Two of the users are limited users while the third is an administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. What else could you do to increase the security of this system?
answer
Disable autorun on the system Set a screensaver password
question
What are common forms of social engineering attack?
answer
Hoax virus information e-mail.
question
What is a form of attach that tricks victims into providing confidential information, such as identity information or logon credentials, through e-mails or Web sites that impersonate an online entity that the victims trusts, such as financial institution or well known e-commerce site?
answer
Phishing
question
What is the best countermeasure against social engineering?
answer
User awareness training
question
What would indicate when a system case cover is removed?
answer
Chassis intrusion detection
question
What security measure uses a unique key that can be used for hardware system identification?
answer
Trusted Platform Module (TPM)
question
You want to configure your computer so that a password is required before the operating system will load. What should you do?
answer
Configure a user password in the BIOS
question
If your anti-virus software does not detect and remove a virus, what should you try first?
answer
Update your virus detection software
question
You discover that a system on your network has been infected with a worm. What is the best way to prevent the spread of the worm to other systems while you work on removing the worm?
answer
Quarantine the computer
question
A user reports that her machines is behaving erratically. She suspects something is wrong because lately a firewall alert keeps indicating programs are trying to access the Internet, and several files have disappeared or have been renamed. What do you suspect is causing these problems?
answer
Malware infection
question
What is not a form of biometrics?
answer
Token device
question
What is the most common form of authentication?
answer
Username and password
question
What type of biometric authentication uses the ridges of your skin?
answer
Fingerprint
question
What provides security for wireless networks?
answer
WPA2
question
What wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
answer
WEP, WPA Personal, and WPA2P Personal
question
What TCP/IP protocol is s secure form of HTTP that uses SSL as a sublayer for security?
answer
HTTPS
question
A small business named Widgets, INC. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: -They use an 802.11n wireless network -The wireless network is broadcasting a SSID of Liksys -The wireless network uses WPA2 with AES security -Directional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security?
answer
Disable SSID broadcast Change the SSID to something other than the default
question
A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following? -They use an 802.11n wireless network -The wireless network SSID is set to BWLAN -The wireless network is not broadcasting the network SSID -The wireless network uses WPA2 with AES security -Omni-directional access points are positioned around the periphery of the building Based on this information, what should you recommend your client do to increase their wireless network security?
answer
Implement directional access points
question
Your client has fired you to evaluate their wired network security posture. As you tour their facility, you note the following: -Server systems are kept in a locked server room -User accounts on desktop systems have strong passwords assigned. -A locked door is used to control access to the work area. Users must use ID badges to enter the area. -Users connect their personal mobile devices to their computers using USB cables. -Users work in three 8-hour shifts per day. Each computer is shared by three users. Each user has a limited account on the computer they use. Based on this information, what should you recommend your client do to increase security?
answer
Disable the USB ports on user's workstations
question
You are configuring a network firewall to allow SMTP outbound e-mail traffic, and POP3 inbound e-mail traffic. What IP ports should you open on the firewall?
answer
25 110
question
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, through you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
answer
443
question
You are configuring a firewall to allow access to a server hosed on the demilitarized zone of your network. You open IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?
answer
Web server, e-mail server
question
You would like to control Internet access based on users, time of day, and Web sites visited. How can you do this?
answer
Install a proxy server. Allow Internet access only through the proxy server.
question
What functions are performed by proxy servers?
answer
Block employees from accessing certain Web sites Cache web pages
question
Two employees cannot access any sites outside of the local network, but can still access internal files on other internal subnets. Other employees are not experiencing the same problem. You suspect the issue may have something to do with the proxy server on your network and the settings in Internet Explorer. What should you do?
answer
Identify the proxy server name and port number in Internet Options.