1102 Security q1 Flashcards
Which of the following is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?
Virus
Which of the following is a risk associated with using a web browser password manager?
Signing in with the browser password gives a hacker control over all passwords stored on the browser.
Which of the following stores user accounts, groups, and their assigned rights and permissions?
Domain Controller
Which of the following identifies the network name on a wireless network?
SSID
While Advanced Encryption Standard (AES) keys can be either 128, 192, or 256 bits in length, AES encrypts everything in one-size data chunks.
Which of the following is the size of those AES data chunks?
128
In which of the following security attacks does the hacker intercept session cookies in order to access the victim’s account?
Session hijacking
Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.)
Medical sensors
Smartwatches
Which of the following Windows 11 options lets you associate your local user account with an online Microsoft account?
Manage my accounts
Which of the following hard drive destruction methods runs the risk of releasing toxic by-products?
Incineration
You are establishing a new security policy for user authentication and want to implement multi-factor authentication
Fingerprint and one-time code text message
Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff who work in the same building.
Due to the sensitive nature of these document, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically given the UNC path to the files.
Which of the following would MOST likely fulfil Ben’s file management requirements?
Administrative share
Your computer has a single NTFS partition that is used for the C: drive with the folders below.
C:\Confidential
C:\PublicReports
In the C:\Confidential folder, you edit the properties for the two files below and assign the Deny Read permission to the Users group.
Reports.doc
Costs.doc
The C:\PublicReports folder allows the Full Control permission for the Users group. There are no other permissions assigned except the default permissions. You then take the following actions. You:
Move Reports.doc from C:\Confidential to C:\PublicReports.
Copy Costs.doc from C:\Confidential to C:\PublicReports.
Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?
Deny Read for Reports.doc and Allow Full Control for Costs.doc.
Which file attribute identifies the file as having been modified since the last backup?
Archive
Which of the following authentication combinations is an example of multi-factor authentication?
PIN and authentication app
Which Windows component prompts the user for credentials or permissions to protect against unauthorized activities, such as an unintended software installation?
User Account Control (UAC)