Download - Preguntas de Ingless
-
8/10/2019 Preguntas de Ingless
1/50
-
8/10/2019 Preguntas de Ingless
2/50
-
8/10/2019 Preguntas de Ingless
3/50
Desea evitar que los usuarios externos adquieran la informacin sobre su red. Debe implementar:
Correct answer selected:
Un firewall
Question 12
Se bloqueara la cuenta de un usuario si realiza lo siguiente reiteradas veces:
Correct answer selected:
Tener errores en la autentificacion del inicio de sesin
Question 13
Cul es un requisito mnimo para implementar la proteccion de acceso a redes (NAP) en unentorno de windows?
Correct answer selected:
Servidores que ejecuten windows server 2008 o una version posterior.
Question 14
Un ataque que disminuye la disponibilidad de un recurso del equipo se denomina:
Correct answer selected:
Denegacin de servicio
Question 15
Las preguntas de seguridad bsica que se usan para restablecer una contrasea son susceptibles a:
Correct answer selected:
Ingeniera social
Question 16
a common vector virus infection is
Correct answer selected:
e-mail attachments
-
8/10/2019 Preguntas de Ingless
4/50
Question 17
La longitud predeterminada de la contrasea para un controlador de dominio de Windows Server
es:
Correct answer selected:
14
Question 18
Un chip de mdulo de plataforma segura (TPM) es un microprocesador que:
Correct answer selected:
almacena claves criptogrficas
Question 19
El propsito de RADIUS es brindar:
Correct answer selected:
Brindar autentificacin centralizada
Question 20
La suplantacin de identidad tiene como objetivo:
Correct answer selected:
obtener informacin al simular ser una entidad confiable
Question 21
La proteccin de acceso a redes (NAP) permite a los administradores controlar el acceso a los
recursos de red segn:
Correct answer selected:
la garantia del equipo
Question 22
-
8/10/2019 Preguntas de Ingless
5/50
Cules dos de las siguientes configuraciones de seguridad pueden controlarse mediante una
directiva de grupo? (elija dos).
Correct answer selected:
Bloqueo automatico de archivos
Question 23
Un usuario malintencionado que intercepta y modifica comunicaciones se conoce como:
Correct answer selected:
"man -in -the-middle"
Question 24
Cul dos de las siguientes opciones se incluyen en un programa antivirus empesarial? (Elija dos).
Incorrect answer selected:
Anlisis de paquete
Correct answer:
Anlisis a pedido
Question 25
Debe usar listas de control del acceso para evitar que ciertos usuarios tengan acceso a archivos de
un equipo. Qu sistema de archivos debe usar?
Correct answer selected:
NTFS
Question 26
Cul es el mtodo ms seguro para transferir documentos?
Correct answer selected:
Medios cifrados.
Question 27
para proteger una red de un ataque de tipo "man-in-the-middle".debe implementar:
-
8/10/2019 Preguntas de Ingless
6/50
Correct answer selected:
traduccion de direcciones de red (NAT)
Question 28
De qu manera IPSec protege las comunicaciones?
Incorrect answer selected:
Almacena de forma segura la clave privada de la red
Correct answer:
Cifrar la carga de datos.
Question 29
Debe concederle a un conjunto de usuarios acceso de solo lectura a un archivo de un recurso
compartido de red- debe agregar a los usuarios a:
Correct answer selected:
Al grupo Invitados
Question 30
Recibe un mensaje de correo electrnico de un amigo que le indica que borre un archivo de
sistema Qu debe hacer?
Correct answer selected:
Advertirle a su amigo que envio un correo de suplantacion de identidad
Question 31
Cules dos caractersticas recomienda para la contrasea de dominio de un usuario? (elija dos).
Correct answer selected:
Que sea fcil recordarla
Question 32
Destruir documentos ayuda a evitar:
Correct answer selected:
-
8/10/2019 Preguntas de Ingless
7/50
ingeniera social
Question 33
Las directivas del historial de contraseas se usan para evitar:
Incorrect answer selected:
que se produzca ataques por fuerza bruta
Correct answer:
que las contraseas se vuelvan a usar de inmediato
Question 34
Cuenta con un dominio de Windows Server 2008 que usa configuraciones de seguridadpredeterminadas. Un usuario intenta iniciar sesion con una contrasea incorrecta mas de un cinco
veces. Automaticamente, la cuenta del usuario:
Correct answer selected:
se bloquear
Question 35
En un contexto de seguridad, el termino "suplantacion" significa:
Correct answer selected:
robo
Question 36
what is the primary advantage of using Active Directory Integrated Zones?
Correct answer selected:
secure replication
Question 37
Debe limitar los permisos de un usuario en su equipo cliente. Ademas, debe otorgarles el permiso
de ejecutar un programa como administrador. Cmo debe configurar el acceso al programa para
lograr lo anterior?
-
8/10/2019 Preguntas de Ingless
8/50
Correct answer selected:
Al usar RunAs
Question 38
DNSSec protege las comunicaciones DNS al agregar (Elija dos):
Correct answer selected:
integridad de datos.
Question 39
El proposito de un control de cuenta de usuario (UAC) es:
Incorrect answer selected:
facilitar el filtrado de internet.
Correct answer:
limitar los privilegios de software.
Question 40
Cul de las siguientes opciones muestra el nivel de acceso de un usuario a un archivo o una
carpeta particular en el servidor?
Incorrect answer selected:
el registro del equipo del cliente
Correct answer:
los permisos efectivos del objeto
Question 41
footprinting maliciosly obtains data from
Correct answer selected:
DNS zones
Question 42
-
8/10/2019 Preguntas de Ingless
9/50
Debe evitar que los usuarios no autorizados lean un archivo especifico en un equipo porttil si este
fue robado.
Correct answer selected:
Sistema de cifrado de archivos (EFS)
Question 43
Trabaja para un servicio de asistencia para una empresa importante. Un usuario solicita un cambio
de contrasea. Qu debe hacer en primer lugar?
Correct answer selected:
Verificar la identidad del usuario
Question 44
El filtrado de Media Access Control (MAC) le permite:
Incorrect answer selected:
evitar comunicaciones entre direcciones IP especificas.
Correct answer:
limitar acceso a la red en funcion del adaptador de red del equipo del cliente
Question 45
A cules dos de las siguientes vulnerabilidades est expuesto el cliente de una red inalmbrica?
Correct answer selected:
espionaje
Question 46
Cul de las siguientes opciones es un permiso de carpeta especial?
Incorrect answer selected:
Modificar.
Correct answer:
Borrar.
-
8/10/2019 Preguntas de Ingless
10/50
Question 47
Kerberos evita:
Correct answer selected:
ataques de reproduccion.
Question 48
Un mensaje de correo electrnico con firma digital:
Correct answer selected:
valida al remitente
Question 49
El proceso de la ubicacin de servidores en un dominio de colisin independiente se denomina:
Correct answer selected:
Red de aislamiento
Question 50
Cul es el requisito minimo para crear medio de BitLocker-To-Go en el equipo de un cliente?
Correct answer selected:
Windows 7 Enterprise Edition
Question 51
Cifrar un archivo evita:
Incorrect answer selected:
que se dae el archivo.
Correct answer:
que aya accesos no autorizados.
Question 52
La biometra se usa para:
-
8/10/2019 Preguntas de Ingless
11/50
Incorrect answer selected:
medir la superficie de ataques.
Correct answer:
autenticar usuarios.
Question 53
En cules tres objetos del sistema de archivos puede establecer permisos NTFS?
Correct answer selected:
Archivos
Question 54
Una LAN inalmbrica particular que se difunde en una red se denomina . . .
Correct answer selected:
Punto de acceso inalambrico (WAP)
Question 55
Cul de las siguientes opciones le permite cambiar los permisos de una carpeta?
Correct answer selected:
Modificar.
Question 56
Debe restringir una cuenta de dominio del acceso al panel de control. Qu debes usar?
Incorrect answer selected:
Usuarios y grupos de dominio.
Correct answer:
Objetos de directiva de grupo.
Question 57
The purpose of Microsoft Baseline Security Analizer is to:
-
8/10/2019 Preguntas de Ingless
12/50
-
8/10/2019 Preguntas de Ingless
13/50
El propsito de BitLocker es:
Incorrect answer selected:
estabilizar una unidad de disco
Correct answer:
cifrar un unidad de disco
Question 63
E-mail attachments received from an unknow source should be
Correct answer selected:
scanned for viruses
Question 64
e-mail bombing attacks a specific entity by
Correct answer selected:
sending high volumes of e-mail
Question 65
Recibe un mensaje de correo electronico que solicita que confirme la informacin de su cuentabancaria. El correo electrnico incluye el vnculo al sitio web de su banco como se muestra a
continuacin: https: / / www. woodgrobebank .com / loginscript / user2.jsp es muy probable que
este correo electrinico sea:
Correct answer selected:
un correo de suplantacin de identidad.
Question 66
El proceso de la ubicacin de servidores en un domino de colision independiente se denomina:
Incorrect answer selected:
filtrado de red
Correct answer:
red de aislamiento
-
8/10/2019 Preguntas de Ingless
14/50
Question 67
El propsito primario de una auditoria de seguridad es:
Correct answer selected:
Determinar el cumplimiento de las normas
Question 68
Microsoft Baseline Security Analyzer scans systems for
Correct answer selected:
missing security updates
Question 69
Cul de las siguientes opciones le permite e un usuario conectarse de una forma segura a la red
corporativa a travez de internet?
Incorrect answer selected:
Traduccion de direcciones de red (NAT)
Correct answer:
Red privada virtual (VPN)
Question 70
Qu tecnologa le permite filtrar comunicaciones entre un programa e Internet?
Correct answer selected:
Firewall del software
Question 71
Los servicios o programas dentro del sistema de un equipo que pueden ser explotados por
usuarios no autorizados se denomina:
Correct answer selected:
Superficie de ataque
-
8/10/2019 Preguntas de Ingless
15/50
Question 72
Cul de los siguientes protocolos cifra las comunidades mientras que un usuario explora
Internet?
Correct answer selected:
HTTPS
Question 73
Cul de las siguientes opciones permite el acceso a todas las funcionalidades del usuario
conectado en un equipo?
Correct answer selected:
Controles Active X
Question 74
Debe instalar un controlador de dominio en una sucursal. Ademas, debe proteger la informacin
del controlador de dominio. No podr proteger fsicamente el servidor Qu debe implementar?
Incorrect answer selected:
Protocolo de tnel capa 2 (L2TP)
Correct answer:
Protocolo de tnel punto a punto (PPTP)
Question 75
Instalar fuentes de alimentacin ininterrumpida a sus servidores es un ejemplo de aplicacin de:
Incorrect answer selected:
accesibiliad
Correct answer:
disponibilidad.
Question 76
En internet Explorer 8, la carcterstica Exploracion de InPrivate evita que:
Incorrect answer selected:
-
8/10/2019 Preguntas de Ingless
16/50
-
8/10/2019 Preguntas de Ingless
17/50
desconectar el equipo de la red
Question 82
para qu implementara las VLAN? ( elija dos motivos)
Incorrect answer selected:
para habilitar las agrupacion de hosts independientemente de la ubicacin fisica
Correct answer:
para separar los hosts de una misma red sin aumentar la sobrecarga
Question 83
Su programa contra correo no deseado bloquea los correos electronicos desde un remitenteparticular. Su empresa necesita recibir correos electonicos de dicho remitente. Qu debera
hacer?
Correct answer selected:
Agregar la direccion del correo electronico a la lista blanca.
Question 84
Las contraseas que contienen palabras reconocibles son vulnerables a:
Correct answer selected:
Un ataque de diccionario
Question 85
Un grupo de usuarios tiene acceso a la carpeta A y todo su contenido. Usted debe evitar que
alguno de los usuarios obtenga acceso a la subcarpeta dentro de la carpeta A Qu debe hacer con
la subcarpeta?
Correct answer selected:
Bloquear la herencia
Question 86
El propsito de RADIUS es:
-
8/10/2019 Preguntas de Ingless
18/50
Correct answer selected:
brindar autentificacion centralizada
Question 87
Los equipos de clientes en su red se encuentran estables y no necesitan ninguna caracterstica
nueva. Cul es el beneficio de la aplicacin de actualizaciones del sistema operativo a dichos
clientes?
Correct answer selected:
Obstruir las vulnerabilidades existentes
Question 88
Debe configurar a todos los servidores en un dominio en la hora correcta para:
Correct answer selected:
correlacionar eventos despues de un ataque
Question 89
Los servidores protegidos fsicamente evitan:
Correct answer selected:
robo.
Question 90
Para evitar que los usuarios copien datos en los medios extraibles, debe:
Correct answer selected:
aplicar una directiva de grupo
Question 91
DDSSec protege las comunicaciones DNS al agregar: ( elija dos.)
Correct answer selected:
Integridad de datos
-
8/10/2019 Preguntas de Ingless
19/50
Question 92
Cul de los siguientes brinda el nivel mas alto de seguridad en un firewall?
Correct answer selected:
filtrado de paquetes
Question 93
Establecer una base de datos como solo lectura es un ejemplo de aplicacin de:
Incorrect answer selected:
confidencialidad.
Correct answer:
accesibilidad.
Question 94
para que un servidor en una red perimetral sea accesible, debe:
Correct answer selected:
usar el firewalls de windows
Question 95
A cul de estas amenazas de seguridad es vulnerable un equipo porttil?
Correct answer selected:
Robo
Question 96
El propsito de un Honeypot es:
Correct answer selected:
atraer a los piratas informticos a un sistema especfico
Question 97
-
8/10/2019 Preguntas de Ingless
20/50
Debe de instalar un controlador de dominio en una sucursal. Ademas, debe proteger la
informacion del controlador de dominio. No podra proteger fisicamente al servidor. Qu debe
implementar?
Correct answer selected:
Protocolo de tunel capa 2 (L2TP).
Question 98
Es un administrador de red. Todos los equipos ejecutan internet exploret 8. Debe proteger a los
usuarios contra la suplantacion de identidad. Cul de estas opciones deves aplicar?
Correct answer selected:
Filtro SmartScreen.
Question 99
Tiene una aplicacin que se comunica mediante un texto sin formato. Desea proteger las
comunicaciones entre la aplicacin y un servidor. Qu debe implementar?
Correct answer selected:
SSL
Question 100
El proposito primario de una auditoria de seguridad automatica es:
Correct answer selected:
determinar el cumplimiento de las normas
Question 101
Su empresa requiere que los usuarios ingresen una serie de caracteres para obtener acceso a la
red inalmbrica. Dicha serie debe cumplir con los siguientes requisitos: Contener ms de 15
caracteres Contener al menos una letra Contener al menos un nmero Contener al menos un
smbolo Qu tecnologa de seguridad cumple con estos requisitos?
Correct answer selected:
WPA2 PSK
-
8/10/2019 Preguntas de Ingless
21/50
Question 102
Un ataque por fuerza bruta:
Correct answer selected:
intenta todas las variaciones posibles de contraseas.
Question 103
Al usar el principio de privilegio minimo, Cul de las siguientes acciones debe permitirles a los
usuarios realizar primero?
Correct answer selected:
enviar un mensaje de correo electronico
Question 104
Implementara un sistema de prevencin de intrusin inalmbrico para:
Correct answer selected:
Prevenir el acceso inalambrico no autorizado
Question 105
Una red privada virtual (VPN) es:
Correct answer selected:
Un tnel que evita que la comunicacin que pasa a travs de el se modifique o sea robada
Question 106
Windows Server Update Services (WSUS) is a tool that
Incorrect answer selected:
updates data stored in Windows servers
Correct answer:
manages updates for Microsoft software
Question 107
-
8/10/2019 Preguntas de Ingless
22/50
Establecer una vigencia mnima de la contrasea limita el tiempo en que un usuario puede:
Incorrect answer selected:
solicitar que se restablezca la contrasea
Correct answer:
cambiar las contraseas
Question 108
Debe tener la posibilidad de realizarle un seguimiento al acceso del archivo. Qu tipo de auditoria
debe implementar?
Incorrect answer selected:
Permisos de archivos.
Correct answer:
Acceso al objeto.
Question 109
Cmo puede confirmar si un equipo en su red es el objetivo de un ataque por fuerza bruta?
Incorrect answer selected:
Al ejecutar el comando mostrar todo el acceso
Correct answer:
Al comprobar el registro de seguridad para intentos de autentificacion fallidos
Question 110
El propsito de un certificado digital es verificar que:
Correct answer selected:
la clave publica le pertenece al remitente.
Question 111
Kerberos evita:
Correct answer selected:
-
8/10/2019 Preguntas de Ingless
23/50
-
8/10/2019 Preguntas de Ingless
24/50
Correct answer selected:
un spyware
Question 117
Cul es el mtodo ms seguro para una red inalmbrica?
Correct answer selected:
WPA2 Enterprise
Question 118
Un rastreador de red es un software o un hardware que:
Correct answer selected:
Captura y analiza la comunicacin de red
Question 119
Debe limitar los programas que pueden ejecutarse en los equipos de clientes a una lista especifica
Qu tecnologia debe implementar?
Correct answer selected:
Directivas de grupo de AppLocker
Question 120
Un dispositivo fsico diseado para recopilar contraseas sin el conocimiento del usuario se
denomina:
Incorrect answer selected:
controlador de teclado.
Correct answer:
registrador de claves.
Question 121
-
8/10/2019 Preguntas de Ingless
25/50
Tiene dos servidores que ejecutan Windows Server. Todas las unidades de ambos servidores se
formatean mediante NTFS. Usted traslada un archivo de un servidor al otro. Los permisos del
archivo en la nueva ubicacin:
Incorrect answer selected:
conservarn los permisos de la carpeta original
Correct answer:
heredarn los premisos de las carpeta destino
Question 122
Un ataque por fuerza bruta:
Correct answer selected:
intenta todas las variaciones posibles de contraseas
Question 123
Transmitir contraseas no cifradas hace que sean vulnerables a la intercepcion de:
Incorrect answer selected:
un cliente de Kerberos.
Correct answer:
un rastreador de paquetes.
Question 124
Implementaria un sistema de prevencion de instrucion inalambrica para:
Incorrect answer selected:
detectar robos de paquetes inalambricos.
Correct answer:
prevenir el acceso inalambrico no autorizado.
INGLESSSS
-
8/10/2019 Preguntas de Ingless
26/50
Question 1
Attempts to establish communications between a client computer or server. The server is not
responding. Confirms that the client and server have network connectivity. What should be
checked below?
Correct answer selected:
windows firewall.
Question 2
The multi-factor authentication requires:
Correct answer selected:
two or more different user authentication methods
Question 3
the reason for implementing the mask indenfiticador Service Set (SSID) is
Incorrect answer selected:
concealment of a shared network resource from unauthorized users
Correct answer:
concealment unknown wireless network equipment
Question 4
Role separation server Improves security by:
Correct answer selected:
Necessary only installing operating system components
Question 5
A common means of infection is:
Correct answer selected:
Attachments in an email
Question 6
-
8/10/2019 Preguntas de Ingless
27/50
software designed to infiltrate or damage a computer without the user's consent is called:
Correct answer selected:
malware
Question 7
Explore the Internet with Internet Explorer. Address bar changes as shown below. https: //
www.woodgrovebank .com / This indicates that the website:
Correct answer selected:
It is safe and reliable
Question 8
When a security audit is performed, the first step is:
Incorrect answer selected:
Setting up a quarantine area for virus
Correct answer:
Make an inventory of technology assets of the company
Question 9
When the address bar shows a padlock, What it is?
Correct answer selected:
It is safe and reliable
Question 10
Many websites that you visit require a username and password How to manage these passwords?
Correct answer selected:
You should store them in an encrypted file
Question 11
Want to prevent external users to acquire information about your network. You must implement:
-
8/10/2019 Preguntas de Ingless
28/50
Correct answer selected:
a firewall
Question 12
Account is blocked if a user does the following repeatedly:
Correct answer selected:
Having errors in the authentication login
Question 13
What is a minimum requirement to implement Network Access Protection (NAP) in a windows
environment?
Correct answer selected:
Servers running Windows Server 2008 or a later version.
Question 14
An attack that reduces the availability of a resource team is called:
Correct answer selected:
Denial of service
Question 15
The basic security questions used to reset a password are susceptible to:
Correct answer selected:
social engineering
Question 16
a common vector virus infection is
Correct answer selected:
e-mail attachments
-
8/10/2019 Preguntas de Ingless
29/50
Question 17
The default length of the password to a domain controller Windows Server is:
Correct answer selected:
14
Question 18
A chip Trusted Platform Module (TPM) is a microprocessor that:
Correct answer selected:
stored cryptographic keys
Question 19
The purpose is to provide RADIUS:
Correct answer selected:
Provide centralized authentication
Question 20
Phishing aims:
Correct answer selected:
information by pretending to be a trustworthy entity
Question 21
The Network Access Protection (NAP) enables administrators to control access to network
resources by:
Correct answer selected:
equipment warranty
Question 22
Which two of the following security settings are controlled by Group Policy? (Choose two.)
Correct answer selected:
-
8/10/2019 Preguntas de Ingless
30/50
Automatic File Locking
Question 23
A malicious user to intercept and modify communications known as:
Correct answer selected:
"Man -in -the-middle"
Question 24
Which two of the following are included in the Business community antivirus program? (Choose
two.)
Incorrect answer selected:
Analysis Package
Correct answer:
Analysis on demand
Question 25
You should use access control lists to prevent certain users from accessing files on a computer.
What file system should I use?
Correct answer selected:
NTFS
Question 26
What is the safest method to transfer documents?
Correct answer selected:
Media encryption.
Question 27
to protect a network from an attack of type "man-in-the-middle" .debe implement:
Correct answer selected:
network address translation (NAT)
-
8/10/2019 Preguntas de Ingless
31/50
Question 28
How IPSec protects communications?
Incorrect answer selected:
Securely stored private key network
Correct answer:
Encrypting the data payload.
Question 29
Must give a set of users read-only access to a file from a shared resource red- must add users to:
Correct answer selected:
When Guests group
Question 30
You receive an email from a friend who asks you to delete a system file What should you do to
him?
Correct answer selected:
Warn your friend to send mail spoofing
Question 31
What two characteristics recommended for the domain password for a user? (Choose two.)
Correct answer selected:
Make it easy to remember
Question 32
Destroying documents helps prevent:
Correct answer selected:
social engineering
-
8/10/2019 Preguntas de Ingless
32/50
Question 33
The password history policies are used to avoid:
Incorrect answer selected:
that occurs attacks brute force
Correct answer:
passwords to be used again immediately
Question 34
It has a Windows Server 2008 domain using default security settings. A user tries to login with the
wrong password more than five times. Automatically, the user account:
Correct answer selected:
is blocked
Question 35
In a security context, the term "impersonation" means:
Correct answer selected:
theft
Question 36
what is the primary advantage of using Active Directory Integrated Zones?
Correct answer selected:
secure replication
Question 37
You should limit the permissions of a user on your client computer. In addition, you must grantpermission to run a program as administrator. How to configure access to the program to achieve
this?
Correct answer selected:
By using RunAs
-
8/10/2019 Preguntas de Ingless
33/50
Question 38
DNSSec protects communications by adding DNS (Choose two):
Correct answer selected:
data integrity.
Question 39
The purpose of a User Account Control (UAC) is:
Incorrect answer selected:
facilitate internet filtering.
Correct answer:
software limit privileges.
Question 40
Which of the following shows the level of user access to a particular file or folder on the server?
Incorrect answer selected:
the registry of the client computer
Correct answer:
the effective permissions of the object
Question 41
obtains data from footprinting maliciosly
Correct answer selected:
DNS zones
Question 42
Must prevent unauthorized users from reading a specific file on a laptop if it was stolen.
Correct answer selected:
Encrypting File System (EFS)
-
8/10/2019 Preguntas de Ingless
34/50
Question 43
He works for a helpdesk for a major corporation. A user requests a password change. What should
you do first?
Correct answer selected:
Verify user identity
Question 44
Filtering Media Access Control (MAC) allows you to:
Incorrect answer selected:
prevent communications between specific IP addresses.
Correct answer:
limit access to the network as a function of the network adapter of the client computer
Question 45
To which two of the following vulnerabilities exposed the client in a wireless network?
Correct answer selected:
spying
Question 46
Which of the following is a special folder permission?
Incorrect answer selected:
Edit.
Correct answer:
Clear.
Question 47
Kerberos avoids:
Correct answer selected:
attacks reproduction.
-
8/10/2019 Preguntas de Ingless
35/50
-
8/10/2019 Preguntas de Ingless
36/50
Question 53
In what three objects in the file system you can set NTFS permissions?
Correct answer selected:
records
Question 54
A particular wireless LAN that is broadcast on a network is called. . .
Correct answer selected:
Wireless Access Point (WAP)
Question 55
Which of the following allows you to change the permissions of a folder?
Correct answer selected:
Edit.
Question 56
You should restrict a domain account access to the control panel. What should you use?
Incorrect answer selected:
Domain Users and Groups.
Correct answer:
Group Policy Objects.
Question 57
The purpose of Microsoft Baseline Security Analyzer is to:
Correct answer selected:
list all possible application vulnerabilities.
Question 58
-
8/10/2019 Preguntas de Ingless
37/50
The certificate of a secure public Internet web server must:
Incorrect answer selected:
issued by a certification authority (CA) business entity.
Correct answer:
issued by a public certification authority (CA).
Question 59
a person asks for your password. This is an example of:
Correct answer selected:
social engineering
Question 60
The main purpose of a firewall is:
Incorrect answer selected:
run the Group Policy app
Correct answer:
filter communications between entities
Question 61
You should hide internal IP addresses and Internet, while maintaining customer access to the
Internet. Which of these should you implement?
Correct answer selected:
Network Address Translation (NAT)
Question 62
The purpose of BitLocker is:
Incorrect answer selected:
stabilize a disk drive
Correct answer:
-
8/10/2019 Preguntas de Ingless
38/50
encrypt a drive
Question 63
E-mail attachments from an unknow source Received Should be
Correct answer selected:
scanned for viruses
Question 64
e-mail bombing attacks by a specific entity
Correct answer selected:
sending high volumes of e-mail
Question 65
Receive an e-mail asking you to confirm your bank account. The email includes a link to the
website of your bank as shown below: https: / / www. woodgrobebank .com / loginscript /
user2.jsp is very likely that this mail Address is:
Correct answer selected:
an e-mail phishing.
Question 66
The process of the location of servers in a separate collision domain is called:
Incorrect answer selected:
filtering network
Correct answer:
network isolation
Question 67
The primary purpose of a safety audit is:
Correct answer selected:
Determine compliance
-
8/10/2019 Preguntas de Ingless
39/50
Question 68
Microsoft Baseline Security Analyzer scans systems for
Correct answer selected:
missing security updates
Question 69
Which of the following options and allows a user to connect securely to a corporate network
through the Internet?
Incorrect answer selected:
Network Address Translation (NAT)
Correct answer:
Virtual Private Network (VPN)
Question 70
What technology allows you to filter communications between a program and the Internet?
Correct answer selected:
Firewall Software
Question 71
Services or programs within a computer system that can be exploited by unauthorized users is
called:
Correct answer selected:
Size of attack
Question 72
Which of the following protocols communities figure while a user browses the Internet?
Correct answer selected:
HTTPS
-
8/10/2019 Preguntas de Ingless
40/50
Question 73
Which of the following allows access to all the features of the user logged on a computer?
Correct answer selected:
Active X Controls
Question 74
You must install a domain controller in a branch office. In addition, to protect the information of
the domain controller. There can physically secure the server What should you implement?
Incorrect answer selected:
Layer 2 Tunneling Protocol (L2TP)
Correct answer:
Protocol Point to Point Tunneling Protocol (PPTP)
Question 75
Install uninterruptible power your servers is an example of application:
Incorrect answer selected:
accesibiliad
Correct answer:
availability.
Question 76
In Internet Explorer 8 InPrivate Browsing feature prevents:
Incorrect answer selected:
entering unauthorized private data
Correct answer:
stored on the computer any data of the session
Question 77
to prevent users from copying data on removable media, you must:
-
8/10/2019 Preguntas de Ingless
41/50
Correct answer selected:
apply a Group Policy
Question 78
A virus that spreads automatically be demonima:
Correct answer selected:
a worm
Question 79
Before implementing Network Access Protection (NAP), you must install:
Incorrect answer selected:
Network Address Translation (NAT)
Correct answer:
Routing and Remote Access
Question 80
The main purpose of a Network Access Protection (NAP) is avoided:
Correct answer selected:
Systems that do not meet the requirements to connect to a network
Question 81
Suspect that a user's computer is infected with virus. What should you do first?
Correct answer selected:
disconnect the computer from the network
Question 82
Why would implement VLANs? (Choose two reasons)
Incorrect answer selected:
to enable grouping of hosts regardless of physical location
-
8/10/2019 Preguntas de Ingless
42/50
Correct answer:
to separate the hosts on the same network without increasing the overhead
Question 83
Your anti-spam software blocks emails from a particular sender. Your company needs electonica
receive emails from that sender. What should you do?
Correct answer selected:
Add the email address to the whitelist.
Question 84
Passwords that contain recognizable words are vulnerable to:
Correct answer selected:
A dictionary attack
Question 85
A user group has access to the folder and all its contents. You should avoid any of the users get
access to subfolder in folder What should the subfolder?
Correct answer selected:
Block inheritance
Question 86
RADIUS is for the purpose of:
Correct answer selected:
provide centralized authentication
Question 87
The client computers on your network are stable and do not need any new features. What is the
benefit of applying operating system updates to those customers?
Correct answer selected:
Obstructing existing vulnerabilities
-
8/10/2019 Preguntas de Ingless
43/50
Question 88
You must configure all servers in a domain to the correct time for:
Correct answer selected:
correlate events after attack
Question 89
Avoid physically protected servers:
Correct answer selected:
theft.
Question 90
To prevent users from copying data on removable media, you must:
Correct answer selected:
apply a Group Policy
Question 91
DDSSec DNS protects communications by adding: (Choose two.)
Correct answer selected:
Data Integrity
Question 92
Which of the following provides the highest level of security on a firewall?
Correct answer selected:
packet filtering
Question 93
Establish a database is a read-only application example:
Incorrect answer selected:
-
8/10/2019 Preguntas de Ingless
44/50
confidentiality.
Correct answer:
accessibility.
Question 94
to a server in a perimeter network is accessible, you should:
Correct answer selected:
use the windows firewall
Question 95
Which of these vulnerable security threats is a laptop?
Correct answer selected:
theft
Question 96
The purpose of a honeypot is:
Correct answer selected:
attract hackers to a specific system
Question 97
You must install a domain controller in a branch office. In addition, to protect the information of
the domain controller. Could not physically protect the server. What should you implement?
Correct answer selected:
Layer 2 Tunnel Protocol (L2TP).
Question 98
It is a network administrator. All computers are running Internet exploret 8. Must protect users
against phishing. Which of these options apply deves?
Correct answer selected:
SmartScreen Filter.
-
8/10/2019 Preguntas de Ingless
45/50
Question 99
You have an application that communicates using a plain text. Want to protect communications
between the application and a server. What should you implement?
Correct answer selected:
SSL
Question 100
The primary purpose of a safety audit is automatic:
Correct answer selected:
determine compliance
Question 101
Your company requires users to enter a string to access the wireless network. This series must
meet the following requirements: Containing more than 15 characters contain at least one letter
Contain at least one number contain at least one symbol What security technology meets these
requirements?
Correct answer selected:
WPA2 PSK
Question 102
A brute force attack:
Correct answer selected:
try every possible password variations.
Question 103
By using the principle of least privilege, which of the following actions should allow users to do
first?
Correct answer selected:
send an email
-
8/10/2019 Preguntas de Ingless
46/50
Question 104
Implement a system for wireless intrusion prevention:
Correct answer selected:
Prevent unauthorized wireless access
Question 105
A virtual private network (VPN) is:
Correct answer selected:
A tunnel that prevents communication that passes through the modifying or stolen
Question 106
Windows Server Update Services (WSUS) is a tool That
Incorrect answer selected:
updates data stored in Windows servers
Correct answer:
Manages updates for Microsoft software
Question 107
Set a minimum password age limits the time in which a user can:
Incorrect answer selected:
request that the password be reset
Correct answer:
change passwords
Question 108
Must be able to follow up on your access file. What type of audit should be implemented?
Incorrect answer selected:
File Permissions.
Correct answer:
-
8/10/2019 Preguntas de Ingless
47/50
Access to the object.
Question 109
How can you confirm whether a computer on your network is the target of a brute force attack?
Incorrect answer selected:
When you run the command show all access
Correct answer:
To check the security log for failed authentication attempts
Question 110
The purpose of a digital certificate is to verify that:
Correct answer selected:
public key belongs to the sender.
Question 111
Kerberos avoids:
Correct answer selected:
attacks reproduction.
Question 112
cookies compromise security by allowing: (pick two)
Incorrect answer selected:
Secure Sockets Layer (SSL)
Correct answer:
storing website passwords
Question 113
Must be able to follow up on your access file. What type of audit should be implemented?
Correct answer selected:
-
8/10/2019 Preguntas de Ingless
48/50
File Permissions
Question 114
Your company has a publicly accessible web server. The server should be located:
Incorrect answer selected:
In a virtual private network (VPN)
Correct answer:
In a perimeter network
Question 115
Encrypt a hard drive is an example of application:
Correct answer selected:
confidentiality.
Question 116
Malicious software designed to collect personal identifying information is called:
Correct answer selected:
spyware
Question 117
What is the safest method for a wireless network?
Correct answer selected:
WPA2 Enterprise
Question 118
A network sniffer is a software or hardware:
Correct answer selected:
It captures and analyzes network communication
-
8/10/2019 Preguntas de Ingless
49/50
Question 119
You should limit the programs that run on the client computers to a specific list what technology
should be implemented?
Correct answer selected:
AppLocker Group Policy
Question 120
A physical device designed to collect passwords without the user's knowledge is called:
Incorrect answer selected:
keyboard driver.
Correct answer:
keylogger.
Question 121
You have two servers that run Windows Server. All units from both servers are formatted using
NTFS. You move a file from one server to another. The file permissions on the new location:
Incorrect answer selected:
will retain the permissions of the parent folder
Correct answer:
inherit the destination folder of premisos
Question 122
A brute force attack:
Correct answer selected:
try all possible variations of passwords
Question 123
Transmit unencrypted passwords makes them vulnerable to interception:
Incorrect answer selected:
Kerberos client.
-
8/10/2019 Preguntas de Ingless
50/50
Correct answer:
a packet sniffer.
Question 124
Would implement a system of prevention of wireless instrucion for:
Incorrect answer selected:
detect theft of wireless packets.
Correct answer:
prevent unauthorized wireless access.