A+ 902 Test 15 Flashcards

1
Q

Phishing scams targeting a specific group of people are generally referred to as:

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An email sent from an unknown source disguised as the source known to the message receiver is an example of:

A

Spoofing

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is known as:

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following fall(s) into the category of social engineering attacks?

A

Spear phishing
Shoulder surfing
Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In computer security, a situation in which an unauthorized person is able to view another user’s display or keyboard to learn their password or other confidential information is known as:

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A zero-day attack exploits:

A

Vulnerability that is present in already released software but unknown to the software developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker is called:

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following terms is used to describe a collection of intermediary compromised systems under control of a hacker?

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An attack against encrypted data that relies heavily on computing power in order to check all possible keys and passwords until the correct one is found is known as a brute-force attack.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the password attacks listed below takes advantage of a predefined list of words?

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of security measure is in place when a client is denied access to the network due to an outdated antivirus software?

A

NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following answers refer(s) to the implementation of best security practices in a corporate environment?

A
User education
Strong authentication
Principle of least privilege
Patch/update management
Appropriate data destruction and disposal methods
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is tailgating?

A

Gaining unauthorized access to restricted areas by following another person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an example of active eavesdropping?

A

MITM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The term “Mantrap” refers to a physical security access control system used to prevent unauthorized users from gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

A

True

17
Q

Which of the security controls listed below is used to prevent tailgating?

A

Mantraps

18
Q

Which of the following provides physical security measure against laptop theft?

A

Cable locks

19
Q

Which of the tools listed below allows for secure disposal of physical documents?

A

Shredder

20
Q

A type of identification badge that can be held within a certain distance of the reader to authenticate the holder is called:

A

RFID badge

21
Q

Privacy filter (aka privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle so data is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing.

A

True

22
Q

Which of the following prevention methods fall(s) into the category of physical security controls?

A

Key fob
Door lock
Biometrics
RFID badge

23
Q

The two factors that are considered important for creating strong passwords are:

A

Password length

Password complexity

24
Q

Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual such as fingerprints (“something you are”), physical tokens such as smart cards (“something you have”), or user names and passwords (“something you know”). Additional factors might include geolocation (“somewhere you are”), or user-specific activity patterns, such as for example keyboard typing style (“something you do”). Multifactor authentication systems require implementation of authentication factors from two or more different categories.

A

True

25
Q

Which of the following examples meets the requirement of multifactor authentication?

A

Password and biometric scan