Chapter 7 Security MC Flashcards
What kind of security breach is a mantrap designed to foil?
Biometric
Tailgating
Sleeping guard
Shoulder surfing
Tailgating
Say that you have been asked to improve security by adding a system to
examine network packets to determine whether they should be forwarded or
blocked. What is the function you would be most likely to add?
MAC address filtering
MAC address cloning
Software firewall
Multifactor authentication
Software firewall
Which of the following is the most secure wireless protocol in use today?
WEP
WEP3
TKIP
WPA2
WPA2
A user has unwittingly downloaded malware while also downloading a free
application on a gaming site. What general term describes the unintentionally
downloaded file?
Worm
Trojan
Ransomware
Botnet
Trojan
Several computers on a network have been commandeered to launch an attack
on a server on the Web. Which term best describes this situation?
Phishing
DoS
Spoofing
DDoS
DDoS
Which setting allows the user the most privileges on a Windows network?
Modify
Read and Execute
Ultimate Use
Write
Modify
Which is the best example of a strong password?
dr0wssap
Password9
Pa5SwoRd5
pA55wrds
Pa5SwoRd5
Which of the following is not an example of biometric authentication?
Entering a password and answering a secret question
Apple FACE ID
Windows Hello
Touch ID
Entering a password and answering a secret question
Which method erases storage media but leaves the device intact?
Data shredding
Degaussing
BitLocking
Incineration
Degaussing
To help hide the identity of a wireless router, what should be changed from the
default setting?
Private IP address
MAC address filter
IP default gateway
Service set identifier
Service set identifier
Andre was running late for work and left his security badge in his car. Rather
than take the time to return to his car and be late, he waited by the outer door
and walked in behind another employee. The other employee was unsure
of who Andre was and was irritated with him for following so closely, so she
didn’t allow Andre to follow her through the inner door to work. He had to
return to his car for the badge. What two security concepts were involved in
this scenario? (Choose two.)
Security guard
Tailgating
Mantrap
Shoulder surfing
Tailgating
Mantrap
Alexa was working her shift in the server room when an alarm went off on a
server belonging to a vendor from another company. She was unable to get to
the reset button on the server. What likely prevented her from accessing the
server whose alarm was going off?
Lack of a key fob
Rack-level security
Lack of authentication
Privacy screen
Rack-level security
Match the type of malware to its description.
Infects and rewrites files. Replicates automatically
with no user intervention.
Spyware
Virus
Worm
Rootkit
Ransomware
Worm
Match the type of malware to its description.
A method of hiding malware from detection
programs.
Spyware
Virus
Worm
Rootkit
Ransomware
Rootkit
Match the type of malware to its description.
Tracks web browsing; uses pop-ups to attract a
user’s attention.
Spyware
Virus
Worm
Rootkit
Ransomware
Spyware