Chapter 9 Review Questions Flashcards
Which of the following are activities that a hacker might attempt?
A. Stealing usernames and passwords B. Modifying website content C. Disrupting network communications D. Analyzing network traffic E. All of the above
All of the above
You have invented a new toy that will be the most popular toy for children this year. What type of intellectual property protection should you get?
A. Trademark
B. Copyright
C. Patent
D. Receipt
Patent
Which of the following are threats to data availability? (Choose two.)
A. Service outage
B. Replay attack
C. Wiretapping
D. Destruction
Service outage
Destruction
What is the name of an application that appears to look like a helpful application but instead does harm to your computer?
A. Virus
B. Worm
C. Malware
D. Trojan horse
Trojan Horse
Someone was recently caught sifting through your company’s trash looking for confidential information. What is this an example of?
A. Trash snooping
B. Dumpster diving
C. Phishing
D. Social engineering
Dumpster diving
You are implementing multifactor security on a computer. Which of the following is not a valid factor?
A. Receipt
B. Password
C. Hardware token
D. Specific location
Receipt
You have been asked to lead a class on preventing social engineering. What two topics should you be sure to cover? (Choose two.)
A. Viruses and worms
B. Shoulder surfing
C. Hardware theft
D. Phishing
Shoulder surfing
Phishing
On a network, a user needs to access three different types of systems. However, they are required to enter their username and password only when they initially log in. Which term best explains this?
A. Authentication
B. Single sign-on
C. Authorization
D. Nonrepudiation
Single sign-on
You receive an email from your bank telling you that your account has been compromised and you need to validate your account details or else your account will be closed. You are supposed to click a link to validate your information. What is this an example of?
A. A security breach at your bank that needs to be resolved
B. Spam
C. Ransomware
D. Phishing
Phishing
If you are concerned about confidentiality of client records, which of the following should you be on the lookout for? (Choose two.)
A. Eavesdropping
B. Denial of service
C. Social engineering
D. Replay attack
Eavesdropping
Social engineering
What is it called when a co-worker sitting next to you always seems to look your way when you try to enter your user ID and password to log onto the network?
A. Phishing
B. Social engineering
C. Shoulder surfing
D. Coincidence
Shoulder surfing
Which of the following security terms best describes the process of determining what a user can do with a resource?
A. Authentication
B. Authorization
C. Accounting
D. Nonrepudiation
Authorization
Which of the following operating systems are susceptible to viruses?
A. Windows
B. Windows and macOS
C. Windows, macOS, and Linux
D. Windows, macOS, Linux, and Android
Windows, macOS, Linux, and Android
A network administrator wants to enable accounting on her network. Which options should she use? (Choose two.)
A. Biometrics
B. Transaction logs
C. Software tokens
D. Web browser history
Transaction logs
Web browser history
Which of the following can be used as an authentication factor and for nonrepudiation?
A. Password
B. One-time password
C. Biometrics
D. Security question
Biometrics