Configure the software to automatically download the

Info icon This preview shows pages 2–5. Sign up to view the full content.

Configure the software to automatically download the virus definition files as soon as they become available. Which type of virus conceals its presence by intercepting system requests and altering service outputs? Stealth Section 7.2.5 In a variation of the brute force attack, an attacker may use a predefined list (dictionary) of common user names and passwords to gain access to existing user accounts. Which countermeasure best addresses this issue? A strong password policy Which of the following password attacks uses preconfigured matrices of hashed dictionary words? Rainbow table Which of the following is most vulnerable to a brute force attack? Password authentication
Image of page 2

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

A user name Bob Smith has been assigned a new desktop workstation to complete his day-to-day work. When provisioning Bob’s user account in your organization’s domain, you assigned an account name of BSmith with an initial password of bw2Fs3d . On first login, Bob is prompted to change his password, so he changes it to the name of his dog ( Fido ). What should you do to increase the security of Bob’s account? (Select two.) Train users no to use passwords that are easy to guess. Use Group Policy to require strong passwords on user accounts. Which of the following strategies can protect against a rainbow table password attack? Add random bits to the password before hashing takes place. Section 7.3.9 Which of the following actions should you take to reduce the attack surface of a server? Disable unused services Which of the following describes a configuration baseline ? A list of common security settings that a group or all devices share You have recently experienced a security incident with one of your servers. After some research, you determine that the hotfix #568994 that has recently been released would have protected the server. Which of the following recommendations should you follow when applying the hotfix? Test the hotfix and then apply it to all servers. You have just purchased a new network device and are getting ready to connect it to your network. Which of the following actions should you take to increase its security? (Select two.) Apply all patches and updates Change default account passwords Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis (typically monthly)? Hotfix Which of the following is the best recommendation for applying hotfixes to your servers? Apply only the hotfixes that affect to software running on your systems.
Image of page 3
By definition, what is the process of reducing security exposure and tightening security controls? Hardening When securing a newly deployed server, which of the following rules of thumb should be followed?
Image of page 4

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern