A+ 1002: CH27 Review Flashcards
What is the correct humidity range for Computer Equipment?
0 - 20%
30 - 40%
60 - 80%
10 - 20%
30 - 40%
Not all _____ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information?
unauthorized
Microsoft’s Encryption method of choice for WAN is _______?
Kerberos
MS-CHAP
IPsec
CHAP
IPsec
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?
Virus
Spyware
Trojan
Worm
Virus
Both wired and wireless networks can use ______ or port security to enable you to blacklist or whitelist devices?
port filtering
MAC filtering
software authentication
two-factor authentication
MAC filtering
Physical Security, Authentication, Users and Groups, and Security Policies are all aspects of _______?
environmental controls
access control
database management
network locks
access control
A user has a credit card-sized card used to prove her identity with a PIN. What is this card called?
Biometric Card
Authorization Card
Task Card
Smart Card
Smart Card
A hardware firewall ______?
uses hardware to recover from effects of viruses
uses replicated hardware for security
disconnects hardware from the internet
inspects incoming packets individually
inspects incoming packets individually
Most Websites today use _______ to encrypt connections?
DLP
IPS
TLS
PAP
TLS
Which current authentication method is typically used over a LAN?
CHAP
MS-CHAP
Kerberos
PAP
Kerberos
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?
Trojan
Spyware
Worm
Virus
Worm
An intrusion prevention system will ______?
prevent intrusion and also stop attacks as they are occurring
provide batch warnings, but not operate in real-time
prevent network intrusion by shutting down your computer
only prevent network intrusion
prevent intrusion and also stop attacks as they are occurring.
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?
Worm
Virus
Spyware
Trojan
Trojan
What can be used to create entries in the Security Log whenever a user logs on?
Event Auditing
Event Tracking
Object access auditing
Success Logging
Event Auditing
Antimalware programs can passively monitor your computers activity. What are they called when operating in this Mode?
Virus Swords
Virus Shields
Spyware
Grayware
Virus Shields