Chapter 7 Security MC Flashcards
What kind of security breach is a mantrap designed to foil?
Biometric
Tailgating
Sleeping guard
Shoulder surfing
Tailgating
Say that you have been asked to improve security by adding a system to
examine network packets to determine whether they should be forwarded or
blocked. What is the function you would be most likely to add?
MAC address filtering
MAC address cloning
Software firewall
Multifactor authentication
Software firewall
Which of the following is the most secure wireless protocol in use today?
WEP
WEP3
TKIP
WPA2
WPA2
A user has unwittingly downloaded malware while also downloading a free
application on a gaming site. What general term describes the unintentionally
downloaded file?
Worm
Trojan
Ransomware
Botnet
Trojan
Several computers on a network have been commandeered to launch an attack
on a server on the Web. Which term best describes this situation?
Phishing
DoS
Spoofing
DDoS
DDoS
Which setting allows the user the most privileges on a Windows network?
Modify
Read and Execute
Ultimate Use
Write
Modify
Which is the best example of a strong password?
dr0wssap
Password9
Pa5SwoRd5
pA55wrds
Pa5SwoRd5
Which of the following is not an example of biometric authentication?
Entering a password and answering a secret question
Apple FACE ID
Windows Hello
Touch ID
Entering a password and answering a secret question
Which method erases storage media but leaves the device intact?
Data shredding
Degaussing
BitLocking
Incineration
Degaussing
To help hide the identity of a wireless router, what should be changed from the
default setting?
Private IP address
MAC address filter
IP default gateway
Service set identifier
Service set identifier
Andre was running late for work and left his security badge in his car. Rather
than take the time to return to his car and be late, he waited by the outer door
and walked in behind another employee. The other employee was unsure
of who Andre was and was irritated with him for following so closely, so she
didn’t allow Andre to follow her through the inner door to work. He had to
return to his car for the badge. What two security concepts were involved in
this scenario? (Choose two.)
Security guard
Tailgating
Mantrap
Shoulder surfing
Tailgating
Mantrap
Alexa was working her shift in the server room when an alarm went off on a
server belonging to a vendor from another company. She was unable to get to
the reset button on the server. What likely prevented her from accessing the
server whose alarm was going off?
Lack of a key fob
Rack-level security
Lack of authentication
Privacy screen
Rack-level security
Match the type of malware to its description.
Infects and rewrites files. Replicates automatically
with no user intervention.
Spyware
Virus
Worm
Rootkit
Ransomware
Worm
Match the type of malware to its description.
A method of hiding malware from detection
programs.
Spyware
Virus
Worm
Rootkit
Ransomware
Rootkit
Match the type of malware to its description.
Tracks web browsing; uses pop-ups to attract a
user’s attention.
Spyware
Virus
Worm
Rootkit
Ransomware
Spyware
Match the type of malware to its description.
Encrypts target files and then demands payment
to unencrypt files.
Spyware
Virus
Worm
Rootkit
Ransomware
Ransomware
Match the type of malware to its description.
Infects and rewrites files. Replicates itself if a user
executes the file
Spyware
Virus
Worm
Rootkit
Ransomware
Virus
As an IT professional, you should be sure to employ security best practices.
Which of the following is not a best practice?
Strong passwords for user accounts
Antivirus/malware protection
Changing the default password on a WAP
WEP encryption
WEP encryption
Which of the following is generally the most difficult form of security for a
malicious hacker to overcome?
Firewall
Encryption
Biometrics
Physical lock and key
Physical lock and key
Biometrics includes the use of which of the following? (Choose all that apply.)
Fingerprint scan
RFID
Retinal scan
Token
Fingerprint scan
Retinal scan
Which of the following is not a type of token?
Key fob
Cable lock
RFID card
Smart card
Cable lock
Which of the following is a program that either blocks or allows data packets
to be delivered to network addresses?
DHCP server
Key fob
Firewall
Network server
Firewall
Which of the following is a characteristic of a strong password? (Choose all
that apply.)
No more than six characters
Lowercase only
Use of symbols
Use of numbers
Use of symbols
Use of numbers
Mike was called to a workstation that was running slowly. After interviewing
the user and asking about recent activity, Mike determined that the user had
opened a fake email and reset his password. Which of the following was the
user most likely involved in?
Tailgating
Dumpster diving
Phishing
Shoulder surfing
Phishing
Fred determined that encryption was the best solution for keeping his USB
flash drive safe while on the road. Which security product would satisfy this
need?
Recovery Console
Single Sign-on (SSO)
BitLocker To Go
USB 3 Lockup
USB 3 Lockup
Ellen, who works at home as an accountant, noticed her wireless network
slowing and wondered if neighbors had started using her network for streaming. Which security practices can she employ to ensure that neighbors don’t gain access to her network and that her clients’ files are protected? (Choose two.)
Change the default IP address on the default gateway.
Change the network name and disable the SSID broadcast.
Use MAC address filtering.
Change the Netflix password.
Change the network name and disable the SSID broadcast.
Use MAC address filtering.
Jen has been tasked with repurposing laptops used by the human resources
department. What can she do to make sure important personnel information
cannot be compromised?
Overwrite
Low-level format
Standard format
Drive wipe
Drive wipe
Hiro is able to log into his account at work but can’t see the work his team is
doing for an advertising client. He didn’t have any trouble before he went on
vacation. What is a reasonable explanation for this problem?
Share permissions were updated while he was gone.
Hiro was locked out due to inactivity
It took Hiro three tries to log into his computer, and his permissions
were suspended after the second attempt.
The boss thought Hiro was leaving the company, so his account was
disabled.
Share permissions were updated while he was gone.
Victoria was updating a computer from another office and realized she needed
to change the UEFI settings. Unfortunately, the UEFI BIOS was password
protected, and the motherboard had no reset buttons or jumpers, as she was
used to seeing. What should she do?
Scrap the motherboard because control of the BIOS/UEFI is essential.
Unplug the computer overnight.
Remove the CMOS battery, go to lunch, and replace the batter after eating.
Change the CPU jumpers.
Remove the CMOS battery, go to lunch, and replace the batter after eating.