Chapter 16 Flashcards

1
Q
Which of the following types of malware self-replicates?
❍ A. Virus
❍ B. Worm
❍ C. Trojan
❍ D. Rootkit
A

❍ B. Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What type of malware is the abuse of electronic messaging systems?
❍ A. Virus
❍ B. Spyware
❍ C. Spam
❍ D. Worm
A

❍ C. Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are symptoms of viruses? (Select the three best answers.)
❍ A. Computer runs slowly.
❍ B. Computer locks up.
❍ C. Excessive pop-up windows appear.
❍ D. A strange website is displayed whenever a search is done.
❍ E. Unusual error messages are displayed.

A

❍ A. Computer runs slowly.
❍ B. Computer locks up.
❍ E. Unusual error messages are displayed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is the science of recognizing humans based on physical
characteristics?
❍ A. Mantraps
❍ B. Biometrics
❍ C. Tailgating
❍ D. Something a person is
A

❍ B. Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A hard drive needs to be disposed of in a way so that no one can access the
data. Which method should you use?
❍ A. Phishing
❍ B. Clearing
❍ C. Shoulder Surfing
❍ D. Destruction
A

❍ D. Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is the best mode to use when scanning for viruses?
❍ A. Safe Mode
❍ B. Last Known Good Configuration
❍ C. Command Prompt only
❍ D. Boot into Windows normally
A

❍ A. Safe Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is one way to prevent spyware?
❍ A. Use firewall exceptions.
❍ B. Adjust Internet Explorer security settings.
❍ C. Adjust the Internet Explorer home page.
❍ D. Remove the spyware from Add/Remove Programs.

A

❍ B. Adjust Internet Explorer security settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One of your customers tells you that a bank employee called and asked for the
person’s bank balance and telephone number. What is this an example of?
❍ A. Spam
❍ B. Virus
❍ C. Social Engineering
❍ D. Trojan

A

❍ C. Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following is the strongest password?
❍ A. |ocrian#
❍ B. Marqu1sD3S0d
❍ C. This1sV#ryS3cure
❍ D. Thisisverysecure
A

❍ C. This1sV#ryS3cure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of these is a security component of Windows 7/Vista?
❍ A. UAC
❍ B. UPS
❍ C. Gadgets
❍ D. Control Panel
A

❍ C. Gadgets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A customer complains that while away at lunch someone used his computer to
send e-mails to other co-workers without his knowledge. What should you recommend?
❍ A. Enable a screensaver.
❍ B. Unplug the network cable before leaving for lunch.
❍ C. Use the Windows lock feature.
❍ D. Enable the out-of-office message in e-mail when leaving for lunch.

A

❍ C. Use the Windows lock feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following best describes encryption?
❍ A. Prevents unauthorized users from viewing or reading data
❍ B. Prevents unauthorized users from deleting data
❍ C. Prevents unauthorized users from posing as the original source sending
data
❍ D. Prevents unauthorized users from decompressing files

A

❍ A. Prevents unauthorized users from viewing or reading data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One of the users on your network is trying to access files shared on a remote computer.
The file’s share permissions allow the user full control. But, the NTFS permissions
allow the user Read access. What will be the resulting access for the user?
❍ A. Full Control
❍ B. Modify
❍ C. Read
❍ D. Write

A

❍ C. Read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are the administrator for your network. You set up an administrative share
called Data$. What is necessary for another user to access this share? (Select
the two best answers.)
❍ A. The user must be part of a HomeGroup.
❍ B. The user must have permissions to access the share.
❍ C. The user must know the decryption key.
❍ D. The user must know the exact network path to the share.
❍ E. The user must enable File Sharing in the Network and Sharing Center.

A

❍ B. The user must have permissions to access the share.

❍ D. The user must know the exact network path to the share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following describes an attempt to guess a password by using a
combination of letters and numbers?
❍ A. Brute force
❍ B. Social Engineering
❍ C. WPS
❍ D. War driving
A

❍ A. Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following will help to secure a SOHO router? (Select the three best
answers.)
❍ A. Change default passwords.
❍ B. Enable SSID.
❍ C. Enable MAC filtering.
❍ D. Enable WPS.
❍ E. Enable WPA2.
A

❍ A. Change default passwords.
❍ C. Enable MAC filtering.
❍ E. Enable WPA2.

17
Q
Which is the strongest form of wireless encryption?
❍ A. WPA
❍ B. WEP
❍ C. AES
❍ D. TKIP
A

❍ C. AES

18
Q

You want to prevent rogue employees from connecting a laptop to the SOHO
router and accessing the network. How can you accomplish this? (Select the two
best answers.)
❍ A. Enable MAC filtering.
❍ B. Create a DMZ.
❍ C. Configure a complex SSID.
❍ D. Disable physical ports.

A

❍ A. Enable MAC filtering.

❍ D. Disable physical ports.