Selamat Datang di Bendrat Forum !!
Selamat Datang di Bendrat Forum Tips & Trick.
Daftar/Log in Untuk Melihat Isi Forum.

Selamat Datang di Bendrat Forum !!

Daftar / Log In Untuk Melihat Isi Forum
 
IndeksPendaftaranLogin
Login
Username:
Password:
Login otomatis: 
:: Lupa password?
Similar topics
Latest topics
» Poker Online, Poker Facebook, Judi Online, Nagapoker
Tue Apr 22, 2014 10:04 pm by batikseo

» Poker Online, Poker Facebook, Judi Online, Nagapoker
Tue Apr 22, 2014 10:04 pm by batikseo

» Poker Online, Poker Facebook, Judi Online, Nagapoker
Tue Apr 22, 2014 10:03 pm by batikseo

» SEAL OFFLINE JOB 2
Sat Aug 31, 2013 8:26 pm by andre1234

» minta link seal offline
Sun Apr 15, 2012 3:56 pm by Admin

» Margot Mariano
Thu Oct 20, 2011 5:23 pm by Admin

» BANTUIN DONK....!!!!!!!!!!!!
Wed Sep 07, 2011 11:10 pm by rendy

» Smack Down Vs RAW PS2 ( Mediafire )
Mon Aug 22, 2011 3:20 am by Admin

» Akses Internet Cepat Menggunakan DNS Alternatif
Sat Jun 18, 2011 7:48 am by Admin

Chat Box Online
 Here
SMS Online Free
 Here
Facebook Bendrat Forum
 Here

Share | 
 

 CCNA V4.1 Chapter 9 Essentials

Topik sebelumnya Topik selanjutnya Go down 
PengirimMessage
Admin
Admin
Admin


Jumlah posting : 32
Reputasi : 0
Join date : 14.01.11
Age : 21
Lokasi : Salatiga,Jawa Tengah,Indonesia

PostSubyek: CCNA V4.1 Chapter 9 Essentials    Wed Jun 15, 2011 8:16 pm



1
What are two examples of malware? (Choose two.)
- Spyware
- Grayware


2
Which three questions should be addressed by organizations developing a security policy? (Choose three.)

- What items need to be protected?
- What is to be done in the case of a security breach?
- What are the possible threats to the items?


3
Which security device stores user physical characteristics to provide a user level of facility access?

- a biometric sensor

4
What are two important outcomes of good computer and network security? (Choose two.)

- keep equipment functioning
- provide access only to authorized users


5
Which two actions improve security on a wireless network? (Choose two.)

- Enable WEP.
- Enable MAC filtering.


6
For troubleshooting security problems, what should be done immediately after the exact cause of the problem is determined?

- Establish a plan of action for resolution.

7
Why should everyone in an organization give high priority to computer and network security?

- because everyone can be affected by computer and network security problems

8
A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?

- Create a restore point.

9
A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which name is given to this type of e-mail?

- Spam

10
How can web tools, such as Java or ActiveX, be used for a malicious attack?

- by installing unwanted programs on a computer

11
At which step of the troubleshooting process will a computer technician ask the customer a series of open-ended and closed-ended questions?

- Identify the problem.

12
Which precaution helps protect against social engineering in the workplace?

- guiding visitors within the premises and escorting them personally when they leave

13
What is a signature as the term is used in antivirus and antispyware software development?

- a programming code pattern

14
A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deploy?

- Replay

15
Which best practice should be included in a password protection policy?

- Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.

16

Refer to the exhibit. What is the correct order for the steps in the troubleshooting process?

- 2, 5, 4, 3, 6, 1

17
A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown?

- The update will be installed as soon as the computer is powered on.

18
What condition can allow unauthorized access to a network for users who are not physically connected to the network?

- poor wireless device security

19
What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses?

- Download the latest signature files on a regular basis.

20
Which two questions are examples of open-ended questions that could be used in the security troubleshooting process? (Choose two.)

- What problems are you experiencing?

- What websites have you visited recently?

Kembali Ke Atas Go down
http://bendrat.forumid.net
 
CCNA V4.1 Chapter 9 Essentials
Topik sebelumnya Topik selanjutnya Kembali Ke Atas 
Halaman 1 dari 1
 Similar topics
-
» Touring subang chapter bandung...
» Pembentukan chapter Ninja 250 Balikpapan
» Usulan Kopdar Chapter Bandung
» NINJA 250R BOGOR
» " Kopdar south chapter @ burger & grill gandaria

Permissions in this forum:Anda tidak dapat menjawab topik
Selamat Datang di Bendrat Forum !! :: Others :: Cisco-
Navigasi: