Section A (Multiple Choice)
[15 marks]
1. A buffer-overflow attack can gain accessto a system's memory. (True or false)
2. A smart card is an authentication example using the something you know factor. (True or false)
3. If users forget their password, they can reset the password with a-----~
they created it before forgetting their password.
as long as
4. Permissions assigned at the drive level are inherited by all root folders on the drive. (True or
false)
5. Permissions are retained when you move a file within the same partition. Any other time you
move or copy files, the original permissions are lost. (True or false)
6. MBSA can detect weak passwords for accounts on Microsoft systems. (True or false)
7. In Linux systems, regular (non-administrator) users can view the etcpasswdfile. (True or false)
8. What is meant by reducing the attack surface of a system?
A. Disabling the anti-virus
B. Removing unneeded protocols
C. Keeping a system up to date
D. Disabling the firewall
9. Elizabeth is a member of the Finance group and the Budget group. The Finance group is
granted Modify permission for an NTFSfolder called Funding. The Budget group is granted
Read permission for the same folder. What is Maria's permission to the Funding folder?
A. Impossible to determine.
B. Read
C. Modify
D. Full Control
10. Which Audit Policy selection records any time a user logs onto a local system?
A. Logan Events
B. Account Logan Events
C. System Events
D. ProcessTracking
Page 11