Network Security Exam Pool A Study Notes
7 Questions
2 Views

Network Security Exam Pool A Study Notes

Created by
@EndorsedMermaid

Questions and Answers

Which of the following would BEST mitigate the threat of a dictionary attack?

  • Antivirus
  • Encryption at rest
  • Automatic screen lock
  • Account lockout (correct)
  • Which of the following Wi-Fi protocols is the MOST secure?

  • WPA3 (correct)
  • WPA-TKIP
  • WPA-AES
  • WEP
  • Which of the following steps should a systems administrator attempt FIRST when an application crashes?

  • Clear the application cache (correct)
  • Reset the phone to factory settings
  • Uninstall and reinstall the application
  • Install an alternative application with similar functionality
  • What is MOST likely to be of concern to the IT manager when upgrading CAD software that forces cloud storage?

    <p>Network utilization will be significantly increased due to the size of CAD files</p> Signup and view all the answers

    What is the NEXT step a technician should take when receiving an unknown antivirus alert?

    <p>Investigate what the interface is and what triggered it to pop up</p> Signup and view all the answers

    Which method should a desktop specialist use to refresh a laptop running Windows 10 for a new employee?

    <p>Clean install</p> Signup and view all the answers

    Which of the following should be updated before requesting approval again after a change advisory board did not approve a requested change?

    <p>Rollback plan</p> Signup and view all the answers

    Study Notes

    Exam Pool A Study Notes

    • A network breach can occur via dictionary attacks, compromising user accounts after repeated attempts. Account lockout is the most effective mitigation strategy to prevent such breaches.

    • Among Wi-Fi protocols, WPA3 stands out as the most secure option, offering enhanced security features compared to WPA-AES, WEP, and WPA-TKIP.

    • When facing app crashes on Android, the first step in troubleshooting is to clear the application cache, ensuring access to critical information. Reinstalling the application may follow if the issue persists.

    • Increasing network utilization is a significant concern when upgrading CAD software that mandates cloud storage for backups. Large CAD files can lead to congestion and slow down overall network performance.

    • If an unfamiliar antivirus message appears on a computer, the technician's immediate action should be to investigate the interface and origin of the notification before taking further steps, ensuring the message's legitimacy.

    • For preparing a laptop for a new employee, a clean install of Windows 10 is recommended, erasing all data and providing a fresh operating system environment.

    • A change advisory board may deny a change request if the rollback plan is inadequate. Before resubmitting the request, it is critical to develop and update a comprehensive rollback plan to outline corrective actions if the change fails.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers essential concepts related to network security, including effective strategies for preventing breaches, secure Wi-Fi protocols, app troubleshooting on Android, and managing network utilization with CAD software. Test your knowledge on these critical topics to prepare for your upcoming examination.

    More Quizzes Like This

    Wi-Fi teemaline teadmiste test
    9 questions
    Wi-Fi Network Security Risks Quiz
    18 questions
    Rodzaje szyfrowania w sieciach Wi-Fi
    10 questions
    Use Quizgecko on...
    Browser
    Browser