1. Where does the story take place? |
Portland |
Boston |
Seattle |
San Francisco
|
2. Which one of the following is a key function of a firewall? |
Monitoring |
Deleting |
Copying |
Moving
|
3. Which one of the following can be considered to be a hardware firewall? |
Router |
Hub |
Bridge |
Switch
|
4. Which of the following will NOT help secure your desktop PCs? |
Turn on Automatic Updates |
Turn on Windows Firewall |
Install antivirus software |
Open email attachments from an unknown sender
|
5. Which of the following is an example of a strong password? |
Password |
Your real name, user name, or company name |
Your real name, user name, or company name |
J*p2le04>F
|
6. True or false: If you have a firewall on your network you don't need to turn on Windows Firewall. |
True |
False |
|
|
7. How can you prevent intruders from accessing your wireless network? |
Encrypt network traffic with WPA or WEP |
Restrict access to trusted MAC addresses |
Both |
None of the above
|
8. True or false: If you set your antivirus software to auto-update then you don't need Windows Automatic Updates. |
True |
False |
|
|
9. How often should you perform an incremental backup? |
Daily |
Every other day |
Weekly |
Monthly
|
10. What method(s) can be used to protect sensitive data from prying eyes? |
Passwords |
File permissions |
Encryption |
All of the above
|
11. What product can be used to update all PCs on your network? |
Software Update Services |
Internet Information Server |
Bluetooth Networking |
Microsoft Baseline Security Analyzer
|
12. What is "phishing?" |
Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data |
A type of computer virus |
An example of a strong password |
None of the above
|
13. True or false: Small businesses are not targets for hackers. |
false |
true |
|
|
14. True or false: If you set your antivirus software to auto-update then you don't need Windows Automatic Updates. |
True |
False |
|
|
15. How can you prevent intruders from accessing your wireless network? |
Encrypt network traffic with WPA or WEP |
Both |
Restrict access to trusted MAC addresses |
None of the above
|
16. Which of the following is an example of a strong password? |
Password |
J*p2le04>F |
Your real name, user name, or company name |
username
|
17. How often should you perform an incremental backup? |
Every other day |
Weekly |
Monthly |
Daily
|
18. What method(s) can be used to protect sensitive data from prying eyes? |
Passwords |
File permissions |
Encryption |
All of the above
|
19. It is possible to distinguish an intruder from normal traffic. |
yes |
no |
|
|
20. Which one of the following can be considered to be a hardware firewall? |
Router |
Hub |
Bridge |
Switch
|