Q1. Which of the following is method that can be used to identify Internet software in Software Restriction Policies?
A. Restriction rule
B. Identification rule
C. Internet rule
D. Zone rule
Answer: D
Q2. Which of the following infects the computer and then hides itself from detection by antivirus software?
A. EICAR virus
B. Boot-sector virus
C. Macro virus
D. Stealth virus
Answer: D
Q3. Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address?
A. Distributed denial of service (DDOS) attack
B. Honeypot
C. RIP/SAP Spoofing
D. Identity spoofing
Answer: D
Q4. Which of the following root keys stores information about registered applications?
A. HKEY_USERS
B. HKEY_CLASSES_ROOT
C. HKEY_CURRENT_CONFIG
D. HKEY_CURRENT_USER
Answer: B
Q5. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement stronger authentication measures for the customers, as well as eliminate IT staff from logging on with high privileges. Mark has various options, but he is required to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges?
A. Secondary Logon-Run As
B. Security log
C. Hardware firewall
D. Encrypted network configuration
Answer: A
Q6. Which of the following is a process in which data is changed before or while it is entered into a computer system?
A. Data diddling
B. Authentication
C. Domain kiting
D. Packet sniffing
Answer: A