A+ 1002: CH27 Review Flashcards
What is the correct humidity range for Computer Equipment?
0 - 20%
30 - 40%
60 - 80%
10 - 20%
30 - 40%
Not all _____ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information?
unauthorized
Microsoft’s Encryption method of choice for WAN is _______?
Kerberos
MS-CHAP
IPsec
CHAP
IPsec
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?
Virus
Spyware
Trojan
Worm
Virus
Both wired and wireless networks can use ______ or port security to enable you to blacklist or whitelist devices?
port filtering
MAC filtering
software authentication
two-factor authentication
MAC filtering
Physical Security, Authentication, Users and Groups, and Security Policies are all aspects of _______?
environmental controls
access control
database management
network locks
access control
A user has a credit card-sized card used to prove her identity with a PIN. What is this card called?
Biometric Card
Authorization Card
Task Card
Smart Card
Smart Card
A hardware firewall ______?
uses hardware to recover from effects of viruses
uses replicated hardware for security
disconnects hardware from the internet
inspects incoming packets individually
inspects incoming packets individually
Most Websites today use _______ to encrypt connections?
DLP
IPS
TLS
PAP
TLS
Which current authentication method is typically used over a LAN?
CHAP
MS-CHAP
Kerberos
PAP
Kerberos
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?
Trojan
Spyware
Worm
Virus
Worm
An intrusion prevention system will ______?
prevent intrusion and also stop attacks as they are occurring
provide batch warnings, but not operate in real-time
prevent network intrusion by shutting down your computer
only prevent network intrusion
prevent intrusion and also stop attacks as they are occurring.
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?
Worm
Virus
Spyware
Trojan
Trojan
What can be used to create entries in the Security Log whenever a user logs on?
Event Auditing
Event Tracking
Object access auditing
Success Logging
Event Auditing
Antimalware programs can passively monitor your computers activity. What are they called when operating in this Mode?
Virus Swords
Virus Shields
Spyware
Grayware
Virus Shields
How does a computer determine who can or should access it, and once accessed, what that user can do?
Transparency
Encryption
Decryption
Authentication
Authentication
Sally is a member of multiple groups. A file has been granted different permissions to these different groups. What is Sally’s effective permission?
Full Control
Combined permissions of all groups
No permission until explicitly granter
Most restrictive permissions of all groups
Combined permissions of all groups
Together, what are Viruses, Trojans, and Worms called?
Open source software
Spyware
Malware
Encrypted Software
Malware
What has occurred when a user accesses resources in an unauthorized way?
Hardware failure
Unauthorized Access
Virus Attack
Environmental Threat
Unauthorized Access
What term describes the process of cleaning up after a virus infection?
Quarantine
Remnants
Remediation
Declassification
Remediation
To lock down security settings on an individual system on a network, what would you use?
Account Lockout Policy
Group Policy
Local Security Policy
Password Policy
Local Security Policy
What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?
Hacking
Internal Virus
Social Engineering
Inside Attack
Social Engineering
A common _____ attack is where an attacker uses the telephone and convinces a user to give up secure information?
Social Engineering
Most computer attacks are accomplished through what type of attack?
Buffer overflows
Port Scanning
Password cracking
Social engineering
Social engineering
What type of virus attempts to change its signature to prevent detection by antivirus programs?
Stealth
Polymorph
Grayware
Spyware
Polymorph
What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?
System crashing
Dumpster diving
Tailgating
Phishing
Phishing
Port forwarding enables you to open a port in a firewall and direct incoming traffic on that port to a ______?
special firewall program
computer on another network
port with a hardware firewall
specific IP address on your LAN
specific IP address on your LAN
What activity involves simply observing someone’s screen or keyboard to get information, often passwords?
Phishing
Shoulder surfing
Tailgating
Dumpster diving
Shoulder surfing