Domain 3: Security Session 1 Flashcards
Which type of malware needs a carrier, such as a Microsoft Office app, in order to propagate?
Choices:
A - Virus
B - Worm
C - Spyware
D - Trojan horse
A - Virus
A user downloaded what was thought to be an antivirus program but instead turned out to be malware. Which type of malware infected the user's computer? Choices: A - Virus B - Worm C - Trojan D - Ransomware
C - Trojan
Which type of malware is most likely to infect an MBR?
Choices:
A - Virus
B - Worm
C - Trojan
D - Rootkit
D - Rootkit
Which is an example of a phishing attack?
Choices:
A - An email which targets a specific individual
B - A seemingly credible update which corrupts the MBR
C - A seemingly credible update which locks up the system
D - An email from a seemingly credible source asking for personal information
D - An email from a seemingly credible source asking for personal information
Which type of phishing attack targets executives or individuals in high authority who have access to a lot of money?
Choices:
A - Whaling
B - Tailgating
C - Spear phishing
D - Social engineering
A - Whaling
Which is an example of social engineering?
Choices:
A - A black hat individual audits a system
B - An attacker leaves a backdoor on a system using a rootkit
C - Someone under a false guise calls an individual and solicits logon information
D - Someone using false credentials creates a fake email account and uses it to send out harmful information
C - Someone under a false guise calls an individual and solicits logon information
Shoulder surfing is when someone looks at a user’s screen while the user enters sensitive information.
A - True
B - False
A - True
Which best defines a botnet or zombies?
Choices:
A - A command server controlling multiple computers
B - Multiple computers carrying out an attack simultaneously
C - One person controlling multiple computers simultaneously
D - One computer infects other computers using the zombie virus
B - Multiple computers carrying out an attack simultaneously
Which type of password attack refers to the attacker simply guessing the password until they get it right?
Choices:
A - Botnet
B - Phishing
C - Spoofing
D - Brute force
D - Brute force
Which are examples of non-compliant systems? Choose two answers.
Choices:
A - A computer with no antimalware protection
B - A computer with an outdated operating system
C - A computer which has the incorrect version of Office installed
D - A computer which has not run Windows Update in the past three days
A - A computer with no antimalware protection
B - A computer with an outdated operating system
Which are ways to make users aware of security standards in the workplace? Choose two answers.
Choices:
A - End-user training
B - Acceptable use policy
C - Principle of least privilege
D - Discretionary access methods
A - End-user training
B - Acceptable use policy
One example of a man-in-the-middle attack is when a __________ is invaded by a third party who intercepts data and impersonates one of the two members involved.
Choices:
A - server
B - monitor
C - two-way email
D - two-way instant messaging chat
D - two-way instant messaging chat
A new hire at a company, in reading the security policy, sees that a clean desk policy is enforced. The new hire wants clarification from IT personnel as to what a clean desk policy entails. Which should the IT personnel tell the new hire?
Choices:
A - A clean desk policy involves keeping the desk dust-free
B - A clean desk policy involves keeping the desk free of food and drink
C - A clean desk policy involves keeping the desk free of network cables
D - A clean desk policy involves keeping the desk clear of any confidential documents
D - A clean desk policy involves keeping the desk clear of any confidential documents
Which disposal method is best used in relation to sensitive documents that are no longer needed?
Choices:
A - Shredder
B - Dumpster
C - Trash can
D - Recycle Bin
A - Shredder
A person tailgates a legitimate employee into a building and is now caught between that door and a more secure door. The person is trapped inside of which kind of area?
Choices:
A - Red
B - Blue
C - Tailgate
D - Mantrap
D - Mantrap
Using facial recognition to unlock a smartphone is a form of which type of physical security?
Choices:
A - RFID
B - Token
C - Biometrics
D - Smart card
C - Biometrics
Which device helps to cut off viewable angles on a monitor?
Choices:
A - Privacy filter
B - Screen cover
C - Screen dimmer
D - Brightness control
A - Privacy filter
Which is an example of a digital antimalware security service?
Choices:
A - Applegate
B - Windows Update
C - Windows Firewall
D - Windows Defender
D - Windows Defender
Strong passwords are made up of uppercase and lowercase letters, numbers, and __________.
Choices:
A - verbs
B - symbols
C - long phrases
D - proper nouns
B - symbols
Which are Linux permission levels? Choose three answers.
Choices:
A - Edit B - Write C - Read D - Listen E - Manage F - Execute
B - Write
C - Read
F - Execute
A user has received an email that seems like junk mail. Which action should the user take?
Choices:
A - Delete the email
B - Send a reply to the email
C - Open the email and see who sent it
D - Send the email to the junk email folder
D - Send the email to the junk email folder
A __________ does not qualify as multifactor authentication.
Choices:
A - username and password
B - retinal scanner and smart card
C - password and fingerprint scanner
D - smart card, username, and password
A - username and password