A+ 1002: CH27 Review Flashcards

1
Q

What is the correct humidity range for Computer Equipment?

0 - 20%
30 - 40%
60 - 80%
10 - 20%

A

30 - 40%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Not all _____ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information?

A

unauthorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Microsoft’s Encryption method of choice for WAN is _______?

Kerberos
MS-CHAP
IPsec
CHAP

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?

Virus
Spyware
Trojan
Worm

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Both wired and wireless networks can use ______ or port security to enable you to blacklist or whitelist devices?

port filtering
MAC filtering
software authentication
two-factor authentication

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical Security, Authentication, Users and Groups, and Security Policies are all aspects of _______?

environmental controls
access control
database management
network locks

A

access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user has a credit card-sized card used to prove her identity with a PIN. What is this card called?

Biometric Card
Authorization Card
Task Card
Smart Card

A

Smart Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A hardware firewall ______?

uses hardware to recover from effects of viruses
uses replicated hardware for security
disconnects hardware from the internet
inspects incoming packets individually

A

inspects incoming packets individually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Most Websites today use _______ to encrypt connections?

DLP
IPS
TLS
PAP

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which current authentication method is typically used over a LAN?

CHAP
MS-CHAP
Kerberos
PAP

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?

Trojan
Spyware
Worm
Virus

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An intrusion prevention system will ______?

prevent intrusion and also stop attacks as they are occurring
provide batch warnings, but not operate in real-time
prevent network intrusion by shutting down your computer
only prevent network intrusion

A

prevent intrusion and also stop attacks as they are occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?

Worm
Virus
Spyware
Trojan

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can be used to create entries in the Security Log whenever a user logs on?

Event Auditing
Event Tracking
Object access auditing
Success Logging

A

Event Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Antimalware programs can passively monitor your computers activity. What are they called when operating in this Mode?

Virus Swords
Virus Shields
Spyware
Grayware

A

Virus Shields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does a computer determine who can or should access it, and once accessed, what that user can do?

Transparency
Encryption
Decryption
Authentication

A

Authentication

17
Q

Sally is a member of multiple groups. A file has been granted different permissions to these different groups. What is Sally’s effective permission?

Full Control
Combined permissions of all groups
No permission until explicitly granter
Most restrictive permissions of all groups

A

Combined permissions of all groups

18
Q

Together, what are Viruses, Trojans, and Worms called?

Open source software
Spyware
Malware
Encrypted Software

A

Malware

19
Q

What has occurred when a user accesses resources in an unauthorized way?

Hardware failure
Unauthorized Access
Virus Attack
Environmental Threat

A

Unauthorized Access

20
Q

What term describes the process of cleaning up after a virus infection?

Quarantine
Remnants
Remediation
Declassification

A

Remediation

21
Q

To lock down security settings on an individual system on a network, what would you use?

Account Lockout Policy
Group Policy
Local Security Policy
Password Policy

A

Local Security Policy

22
Q

What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?

Hacking
Internal Virus
Social Engineering
Inside Attack

A

Social Engineering

23
Q

A common _____ attack is where an attacker uses the telephone and convinces a user to give up secure information?

A

Social Engineering

24
Q

Most computer attacks are accomplished through what type of attack?

Buffer overflows
Port Scanning
Password cracking
Social engineering

A

Social engineering

25
Q

What type of virus attempts to change its signature to prevent detection by antivirus programs?

Stealth
Polymorph
Grayware
Spyware

A

Polymorph

26
Q

What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?

System crashing
Dumpster diving
Tailgating
Phishing

A

Phishing

27
Q

Port forwarding enables you to open a port in a firewall and direct incoming traffic on that port to a ______?

special firewall program
computer on another network
port with a hardware firewall
specific IP address on your LAN

A

specific IP address on your LAN

28
Q

What activity involves simply observing someone’s screen or keyboard to get information, often passwords?

Phishing
Shoulder surfing
Tailgating
Dumpster diving

A

Shoulder surfing