Chapter 7 Security MC Flashcards

1
Q

What kind of security breach is a mantrap designed to foil?

Biometric

Tailgating

Sleeping guard

Shoulder surfing

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Say that you have been asked to improve security by adding a system to
examine network packets to determine whether they should be forwarded or
blocked. What is the function you would be most likely to add?

MAC address filtering

MAC address cloning

Software firewall

Multifactor authentication

A

Software firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the most secure wireless protocol in use today?

WEP

WEP3

TKIP

WPA2

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user has unwittingly downloaded malware while also downloading a free
application on a gaming site. What general term describes the unintentionally
downloaded file?

Worm

Trojan

Ransomware

Botnet

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Several computers on a network have been commandeered to launch an attack
on a server on the Web. Which term best describes this situation?

Phishing

DoS

Spoofing

DDoS

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which setting allows the user the most privileges on a Windows network?

Modify

Read and Execute

Ultimate Use

Write

A

Modify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which is the best example of a strong password?

dr0wssap

Password9

Pa5SwoRd5

pA55wrds

A

Pa5SwoRd5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is not an example of biometric authentication?

Entering a password and answering a secret question

Apple FACE ID

Windows Hello

Touch ID

A

Entering a password and answering a secret question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which method erases storage media but leaves the device intact?

Data shredding

Degaussing

BitLocking

Incineration

A

Degaussing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To help hide the identity of a wireless router, what should be changed from the
default setting?

Private IP address

MAC address filter

IP default gateway

Service set identifier

A

Service set identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Andre was running late for work and left his security badge in his car. Rather
than take the time to return to his car and be late, he waited by the outer door
and walked in behind another employee. The other employee was unsure
of who Andre was and was irritated with him for following so closely, so she
didn’t allow Andre to follow her through the inner door to work. He had to
return to his car for the badge. What two security concepts were involved in
this scenario? (Choose two.)

Security guard

Tailgating

Mantrap

Shoulder surfing

A

Tailgating

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Alexa was working her shift in the server room when an alarm went off on a
server belonging to a vendor from another company. She was unable to get to
the reset button on the server. What likely prevented her from accessing the
server whose alarm was going off?

Lack of a key fob

Rack-level security

Lack of authentication

Privacy screen

A

Rack-level security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Match the type of malware to its description.

Infects and rewrites files. Replicates automatically
with no user intervention.

Spyware

Virus

Worm

Rootkit

Ransomware

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Match the type of malware to its description.

A method of hiding malware from detection
programs.

Spyware

Virus

Worm

Rootkit

Ransomware

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Match the type of malware to its description.

Tracks web browsing; uses pop-ups to attract a
user’s attention.

Spyware

Virus

Worm

Rootkit

Ransomware

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Match the type of malware to its description.

Encrypts target files and then demands payment
to unencrypt files.

Spyware

Virus

Worm

Rootkit

Ransomware

A

Ransomware

17
Q

Match the type of malware to its description.

Infects and rewrites files. Replicates itself if a user
executes the file

Spyware

Virus

Worm

Rootkit

Ransomware

A

Virus

18
Q

As an IT professional, you should be sure to employ security best practices.
Which of the following is not a best practice?

Strong passwords for user accounts

Antivirus/malware protection

Changing the default password on a WAP

WEP encryption

A

WEP encryption

19
Q

Which of the following is generally the most difficult form of security for a
malicious hacker to overcome?

Firewall

Encryption

Biometrics

Physical lock and key

A

Physical lock and key

20
Q

Biometrics includes the use of which of the following? (Choose all that apply.)

Fingerprint scan

RFID

Retinal scan

Token

A

Fingerprint scan

Retinal scan

21
Q

Which of the following is not a type of token?

Key fob

Cable lock

RFID card

Smart card

A

Cable lock

22
Q

Which of the following is a program that either blocks or allows data packets
to be delivered to network addresses?

DHCP server

Key fob

Firewall

Network server

A

Firewall

23
Q

Which of the following is a characteristic of a strong password? (Choose all
that apply.)

No more than six characters

Lowercase only

Use of symbols

Use of numbers

A

Use of symbols

Use of numbers

24
Q

Mike was called to a workstation that was running slowly. After interviewing
the user and asking about recent activity, Mike determined that the user had
opened a fake email and reset his password. Which of the following was the
user most likely involved in?

Tailgating

Dumpster diving

Phishing

Shoulder surfing

A

Phishing

25
Q

Fred determined that encryption was the best solution for keeping his USB
flash drive safe while on the road. Which security product would satisfy this
need?

Recovery Console

Single Sign-on (SSO)

BitLocker To Go

USB 3 Lockup

A

USB 3 Lockup

26
Q

Ellen, who works at home as an accountant, noticed her wireless network
slowing and wondered if neighbors had started using her network for streaming. Which security practices can she employ to ensure that neighbors don’t gain access to her network and that her clients’ files are protected? (Choose two.)

Change the default IP address on the default gateway.

Change the network name and disable the SSID broadcast.

Use MAC address filtering.

Change the Netflix password.

A

Change the network name and disable the SSID broadcast.

Use MAC address filtering.

27
Q

Jen has been tasked with repurposing laptops used by the human resources
department. What can she do to make sure important personnel information
cannot be compromised?

Overwrite

Low-level format

Standard format

Drive wipe

A

Drive wipe

28
Q

Hiro is able to log into his account at work but can’t see the work his team is
doing for an advertising client. He didn’t have any trouble before he went on
vacation. What is a reasonable explanation for this problem?

Share permissions were updated while he was gone.

Hiro was locked out due to inactivity

It took Hiro three tries to log into his computer, and his permissions
were suspended after the second attempt.

The boss thought Hiro was leaving the company, so his account was
disabled.

A

Share permissions were updated while he was gone.

29
Q

Victoria was updating a computer from another office and realized she needed
to change the UEFI settings. Unfortunately, the UEFI BIOS was password
protected, and the motherboard had no reset buttons or jumpers, as she was
used to seeing. What should she do?

Scrap the motherboard because control of the BIOS/UEFI is essential.

Unplug the computer overnight.

Remove the CMOS battery, go to lunch, and replace the batter after eating.

Change the CPU jumpers.

A

Remove the CMOS battery, go to lunch, and replace the batter after eating.