622 Flashcards

1
Q

A _____________is a collection of programs that grants a hacker admin access to a computer or network. The hacker first gains access to a single system, and then uploads the _________to the hacked system. An example of a _________ is a ___________module that modifies file system operations. —

A

rootkit / rootkit / rootkit / system-level kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____________is a software application that displays advertisements while the application is executing. —

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Some adware is also __________if it monitors your Internet usage and personal information. Some adware will even allow credit card information theft. —

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__________ often uses tracking cookies to collect and report a user’s activities. Not all _________ is adware, and not all adware is ________. To define a program as _________requires that your activities are monitored and tracked; to define a program as adware requires that advertisements are displayed. —

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A worm is a program that spreads itself through —

A

network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware is the term used to describe a group of malicious software applications that include: —

A
Viruses     
Worms     
Spyware     
Trojans     
Rootkits     
Backdoors     
Logic bombs     
Botnets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Biometric locks offer the most protection from loss or theft of the access device. They are based on the security concept of —

A

something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biometrics match a users uniquely identifiable physical attribute to a previously stored value. They are among the most

A

secure physical security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Server locks restrict access to the devices in the server cabinet. They can be locked through a key in the same manner that door —

A

locks can be secured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

USB locks are USB flash drives that contain an ______________that unlocks the computer. When the USB drive is inserted into the port, the computer is unlocked. When the USB drive is removed, the computer is locked. —

A

electronic key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key fobs contain a hardware token and are often used for______________ authentication. They are easily lost or stolen. —

A

Near-Field Communications (NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You should deploy biometrics, smart cards, and strong passwords. This covers three different factors of authentication: –

A

something you are
something you have
something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Biometrics devices help verify users’ identities against unique physical characteristics. Biometric devices include —

A

retinal scanners
hand scanners
fingerprint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Smart cards, which are a type of identification badge, are used to give people access to buildings, doors and computers and parking lots. Smart cards are inserted into a computer or a smart card reader. Although you cannot duplicate them, they can be easily stolen, so modern smart cards have users enter —

A

passwords or PINs to activate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Usernames, strong passwords, and a PIN are all things you know, so this solution would not be considered —

A

multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Smart cards, usernames, and strong passwords only include two factor types: —

A

something you have

something you know.

17
Q

Smart cards, usernames, and PINs only include two factor types: —

A

something you have and something you know.

18
Q

___________________is the greatest threat to the security of mobile devices. —

A

Theft

19
Q

_____________________would protect a users data in the event of a hard drive crash. Instead of storing the users data , such as the Documents folder on the local hard drive, ______________________points to a network storage location, such as a server or a cloud location.

A

Folder redirection

20
Q

Login scripts would allow you to assign security policies to users at the time of login, but they would not

A

inherently protect against a hard drive crash

21
Q

Domain membership, in terms of logical security, would validate that the user, group, or device should be granted —

A

access to the domain.

22
Q

Organizational units, in terms of logical security, would validate that the user, group, or device should be granted access to the —

A

appropriate portion of the domain.

23
Q

Other logical security controls including maintenance of Group Policy/updates, and the location of a users —

A

Home Folder.

24
Q

___________________ is a set of business rules that protect data in use data in motion, and data at rest. _________ is the general term for the technology used to protect a companys information from accidental or intentional leaks

A

Data Loss Prevention DLP

25
Q

_______________________would only protect data in motion. _________________ prevents unknown devices from forwarding packets. ___________ scan data as it is entering or leaving the network and may be configured to block IP address ranges, domains, or packet content. —

A

Port security and firewalls

26
Q

Certificates would only protect data in use. A good way to use a certificate for DLP would be to prevent a man-in-the-middle attack by —

A

requiring the sender or recipient certificate prior to transmitting the data.