Name: 
 

Day7Ch15



Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

Which of these are used to set user right assignments?
a.
Local policies
b.
IP security policies
c.
Account policies
d.
Public key policies
 

 2. 

True or False? Once you have installed Service Pack 2 on Windows XP, you must then separately install Windows Firewall.
a.
True
b.
False
 

 3. 

Which of these is software that protects a computer by controlling incoming traffic, and in some cases, protects the network and other computers by controlling outgoing traffic?
a.
Site survey
b.
Wardriving
c.
Firewall
d.
SSL
 

 4. 

What is an analysis technique that determines the coverage area of a wireless network, identifies any sources of interference, and establishes other characteristics of the coverage area?
a.
Site survey
b.
Firewall
c.
Social engineering attack
d.
Phishing
 

 5. 

True or False? You can configure Windows Firewall exceptions to permit unsolicited incoming traffic to pass through the firewall.
a.
True
b.
False
 

 6. 

Which of the following common security options allows you to configure different options for logging information concerning unsolicited traffic on your network?
a.
Unsolicited traffic blocking
b.
Security log
c.
Application access
d.
Global security level
 

 7. 

Which of these common computer security issues might be a sign of an attempted security breach?
a.
Data access issues
b.
File system security issues
c.
Backup security issues
d.
Authentication issues
 

Multiple Response
Identify one or more choices that best complete the statement or answer the question.
 

 8. 

Biometric devices can be used for access control. Which of the following are examples of biometric technology?
 a.
Hand geometry scanner
 b.
Handwriting verification
 c.
Footprint scanning
 d.
Iris recognition
 e.
Voice verification
 

 9. 

Fingerprint scanners scan the fingerprints on a user’s hand. Which of the following are advantages of fingerprint scanners?
 a.
Fingerprint collection is simple and inexpensive.
 b.
Fingerprint scanners are common.
 c.
Fingerprint scanners are accurate and stable.
 d.
Fingerprint scanners work regardless of the cleanliness of the user's hands.
 

 10. 

Which of these does Service Pack 2 security enhancements provide?
 a.
Firewall
 b.
Pop-up ad blocker
 c.
Automatic update monitoring
 d.
Anti-virus software monitoring
 

 11. 

What are some common wireless client configuration issues?
 a.
Protocol compatibility issues.
 b.
SSL on WAP.
 c.
Normal network traffic can be misinterpreted as an attack.
 d.
Site surveys.
 e.
Social engineering attacks.
 



 
Check Your Work     Start Over