Chapter 7 Security MC Flashcards
What kind of security breach is a mantrap designed to foil?
Biometric
Tailgating
Sleeping guard
Shoulder surfing
Tailgating
Say that you have been asked to improve security by adding a system to
examine network packets to determine whether they should be forwarded or
blocked. What is the function you would be most likely to add?
MAC address filtering
MAC address cloning
Software firewall
Multifactor authentication
Software firewall
Which of the following is the most secure wireless protocol in use today?
WEP
WEP3
TKIP
WPA2
WPA2
A user has unwittingly downloaded malware while also downloading a free
application on a gaming site. What general term describes the unintentionally
downloaded file?
Worm
Trojan
Ransomware
Botnet
Trojan
Several computers on a network have been commandeered to launch an attack
on a server on the Web. Which term best describes this situation?
Phishing
DoS
Spoofing
DDoS
DDoS
Which setting allows the user the most privileges on a Windows network?
Modify
Read and Execute
Ultimate Use
Write
Modify
Which is the best example of a strong password?
dr0wssap
Password9
Pa5SwoRd5
pA55wrds
Pa5SwoRd5
Which of the following is not an example of biometric authentication?
Entering a password and answering a secret question
Apple FACE ID
Windows Hello
Touch ID
Entering a password and answering a secret question
Which method erases storage media but leaves the device intact?
Data shredding
Degaussing
BitLocking
Incineration
Degaussing
To help hide the identity of a wireless router, what should be changed from the
default setting?
Private IP address
MAC address filter
IP default gateway
Service set identifier
Service set identifier
Andre was running late for work and left his security badge in his car. Rather
than take the time to return to his car and be late, he waited by the outer door
and walked in behind another employee. The other employee was unsure
of who Andre was and was irritated with him for following so closely, so she
didn’t allow Andre to follow her through the inner door to work. He had to
return to his car for the badge. What two security concepts were involved in
this scenario? (Choose two.)
Security guard
Tailgating
Mantrap
Shoulder surfing
Tailgating
Mantrap
Alexa was working her shift in the server room when an alarm went off on a
server belonging to a vendor from another company. She was unable to get to
the reset button on the server. What likely prevented her from accessing the
server whose alarm was going off?
Lack of a key fob
Rack-level security
Lack of authentication
Privacy screen
Rack-level security
Match the type of malware to its description.
Infects and rewrites files. Replicates automatically
with no user intervention.
Spyware
Virus
Worm
Rootkit
Ransomware
Worm
Match the type of malware to its description.
A method of hiding malware from detection
programs.
Spyware
Virus
Worm
Rootkit
Ransomware
Rootkit
Match the type of malware to its description.
Tracks web browsing; uses pop-ups to attract a
user’s attention.
Spyware
Virus
Worm
Rootkit
Ransomware
Spyware
Match the type of malware to its description.
Encrypts target files and then demands payment
to unencrypt files.
Spyware
Virus
Worm
Rootkit
Ransomware
Ransomware
Match the type of malware to its description.
Infects and rewrites files. Replicates itself if a user
executes the file
Spyware
Virus
Worm
Rootkit
Ransomware
Virus
As an IT professional, you should be sure to employ security best practices.
Which of the following is not a best practice?
Strong passwords for user accounts
Antivirus/malware protection
Changing the default password on a WAP
WEP encryption
WEP encryption
Which of the following is generally the most difficult form of security for a
malicious hacker to overcome?
Firewall
Encryption
Biometrics
Physical lock and key
Physical lock and key
Biometrics includes the use of which of the following? (Choose all that apply.)
Fingerprint scan
RFID
Retinal scan
Token
Fingerprint scan
Retinal scan
Which of the following is not a type of token?
Key fob
Cable lock
RFID card
Smart card
Cable lock
Which of the following is a program that either blocks or allows data packets
to be delivered to network addresses?
DHCP server
Key fob
Firewall
Network server
Firewall
Which of the following is a characteristic of a strong password? (Choose all
that apply.)
No more than six characters
Lowercase only
Use of symbols
Use of numbers
Use of symbols
Use of numbers
Mike was called to a workstation that was running slowly. After interviewing
the user and asking about recent activity, Mike determined that the user had
opened a fake email and reset his password. Which of the following was the
user most likely involved in?
Tailgating
Dumpster diving
Phishing
Shoulder surfing
Phishing