Chapter 16 Flashcards
Which of the following types of malware self-replicates? ❍ A. Virus ❍ B. Worm ❍ C. Trojan ❍ D. Rootkit
❍ B. Worm
What type of malware is the abuse of electronic messaging systems? ❍ A. Virus ❍ B. Spyware ❍ C. Spam ❍ D. Worm
❍ C. Spam
Which of the following are symptoms of viruses? (Select the three best answers.)
❍ A. Computer runs slowly.
❍ B. Computer locks up.
❍ C. Excessive pop-up windows appear.
❍ D. A strange website is displayed whenever a search is done.
❍ E. Unusual error messages are displayed.
❍ A. Computer runs slowly.
❍ B. Computer locks up.
❍ E. Unusual error messages are displayed.
Which of the following is the science of recognizing humans based on physical characteristics? ❍ A. Mantraps ❍ B. Biometrics ❍ C. Tailgating ❍ D. Something a person is
❍ B. Biometrics
A hard drive needs to be disposed of in a way so that no one can access the data. Which method should you use? ❍ A. Phishing ❍ B. Clearing ❍ C. Shoulder Surfing ❍ D. Destruction
❍ D. Destruction
Which of the following is the best mode to use when scanning for viruses? ❍ A. Safe Mode ❍ B. Last Known Good Configuration ❍ C. Command Prompt only ❍ D. Boot into Windows normally
❍ A. Safe Mode
Which of the following is one way to prevent spyware?
❍ A. Use firewall exceptions.
❍ B. Adjust Internet Explorer security settings.
❍ C. Adjust the Internet Explorer home page.
❍ D. Remove the spyware from Add/Remove Programs.
❍ B. Adjust Internet Explorer security settings.
One of your customers tells you that a bank employee called and asked for the
person’s bank balance and telephone number. What is this an example of?
❍ A. Spam
❍ B. Virus
❍ C. Social Engineering
❍ D. Trojan
❍ C. Social Engineering
Which of the following is the strongest password? ❍ A. |ocrian# ❍ B. Marqu1sD3S0d ❍ C. This1sV#ryS3cure ❍ D. Thisisverysecure
❍ C. This1sV#ryS3cure
Which of these is a security component of Windows 7/Vista? ❍ A. UAC ❍ B. UPS ❍ C. Gadgets ❍ D. Control Panel
❍ C. Gadgets
A customer complains that while away at lunch someone used his computer to
send e-mails to other co-workers without his knowledge. What should you recommend?
❍ A. Enable a screensaver.
❍ B. Unplug the network cable before leaving for lunch.
❍ C. Use the Windows lock feature.
❍ D. Enable the out-of-office message in e-mail when leaving for lunch.
❍ C. Use the Windows lock feature.
Which of the following best describes encryption?
❍ A. Prevents unauthorized users from viewing or reading data
❍ B. Prevents unauthorized users from deleting data
❍ C. Prevents unauthorized users from posing as the original source sending
data
❍ D. Prevents unauthorized users from decompressing files
❍ A. Prevents unauthorized users from viewing or reading data
One of the users on your network is trying to access files shared on a remote computer.
The file’s share permissions allow the user full control. But, the NTFS permissions
allow the user Read access. What will be the resulting access for the user?
❍ A. Full Control
❍ B. Modify
❍ C. Read
❍ D. Write
❍ C. Read
You are the administrator for your network. You set up an administrative share
called Data$. What is necessary for another user to access this share? (Select
the two best answers.)
❍ A. The user must be part of a HomeGroup.
❍ B. The user must have permissions to access the share.
❍ C. The user must know the decryption key.
❍ D. The user must know the exact network path to the share.
❍ E. The user must enable File Sharing in the Network and Sharing Center.
❍ B. The user must have permissions to access the share.
❍ D. The user must know the exact network path to the share.
Which of the following describes an attempt to guess a password by using a combination of letters and numbers? ❍ A. Brute force ❍ B. Social Engineering ❍ C. WPS ❍ D. War driving
❍ A. Brute force