Question No: 21 HOTSPOT
You are preparing a local audit policy for your workstation. No auditing is enabled. The settings of your policy are shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Explanation: First answer – Audit account logon events Second answers – audit system events
Dozens of events can be audited in Windows. The events fall into several categories:
->Audit account logon events – audit each instance of a user logging on to or logging off from another computer in which this computer is used to validate the account. This event category is applicable to domain controllers only since DC’s are used to validate accounts in domains.
->Audit account management – audit each event of account management on a
computer. Examples of account maintenance include password changes, user account and group modifications.
->Audit directory service access – audit the event of a user accessing an Active
Directory object that has its own system access control list (SACL) specified.
->Audit logon events – audit each instance of a user logging on to or logging off from a computer. Note that this is different than the ‘Audit account login events’ category. This tracks the logon event to a specific server. The former tracks which domain controller authenticated the user.
->Audit object access – audit the event of a user accessing an object that has its own system access control list (SACL) specified. Examples of objects are files, folders, registry keys, printers, etc.
->Audit policy change – audit every incident of a change to user rights assignment policies, audit policies, or trust policies.
->Audit privilege use – audit each instance of a user exercising a user right.
->Audit process tracking – audit detailed tracking information for events such as program activation, process exit, handle duplication, and indirect object access.
->Audit system events – audit when a user restarts or shuts down the computer or when an event occurs that affects either the system security or the security log.
Question No: 22
Humongous Insurance is an online healthcare insurance company. During an annual security audit a security firm tests the strength of the company#39;s password policy and suggests that Humongous Insurance implement password history policy.
What is the likely reason that the security firm suggests this?
Past passwords were easily cracked by the brute force method.
Past passwords of users contained dictionary words.
Previous password breaches involved use of past passwords.
Past passwords lacked complexity and special characters.
Question No: 23
In Internet Explorer 8, the InPrivate Browsing feature prevents:
Unauthorized private data input.
Unencrypted communication between the client computer and the server.
User credentials from being sent over the Internet.
Any session data from being stored on the computer.
Question No: 24
Role separation improves server security by:
Enforcing principle of least privilege.
Installing applications on separate hard disks.
Physically separating high security servers from other servers.
Placing servers on separate VLANs.
Question No: 25
Network Access Protection (NAP) enables administrators to control access to network resources based on a computer#39;s:
Explanation: Network Access Protection (NAP) is a new set of operating system components included with the Windows Server庐 2008 and Windows Vista庐 operating systems that provides a platform to help ensure that client computers on a private network meet administrator-defined requirements for system health. NAP policies define the required configuration and update status for a client computer’s operating system and
critical software. For example, computers might be required to have antivirus software with the latest signatures installed, current operating system updates installed, and a host- based firewall enabled. By enforcing compliance with health requirements, NAP can help network administrators mitigate some of the risk caused by improperly configured client computers that might be exposed to viruses and other malicious software.
Question No: 26
Which password attack uses all possible alpha numeric combinations?
Brute force attack
Rainbow table attack
Question No: 27 HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Question No: 28
A brute force attack:
Uses response filtering
Tries all possible password variations
Uses the strongest possible algorithms
Targets all the ports
Question No: 29 HOTSPOT
No. Each correct selection is worth one point.
Question No: 30
What is an example of non-propagating malicious code?
A back door
A Trojan horse
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|