module 8 Flashcards

1
Q

In which of the following should you expect some privacy?

Emailing an important document to a friend using an employer email system

Sharing a photo through a mobile phone app

Metadata stored by a web browser

Personally identifiable information entered into a human resource database

A

Personally identifiable information entered into a human resource database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In which of the following situations should you expect total privacy?

Instant messaging

Email messages and attachments

Financial transactions

Social networkin

A

Financial transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select two.)

Avoid anti-virus apps

Keep the operating system up to date

Turn off location services

Lock the screen with some form of authentication

Keep an up-to-date remote backup

Keep your device always in your possession

A

Keep the operating system up to date

Lock the screen with some form of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a common form of social engineering attack?

Stealing the key card of an employee and using that to enter a secured building.

Distributing false information about your organization’s financial status.

Hoax virus information emails.

Using a sniffer to capture network traffic.

A

Hoax virus information emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?

Open the attachment because he has anti-virus software installed.

Forward the email to a friend and ask for advice.

Reply to the sender and ask if the attachment is safe.

Delete the email without opening the attachment.

A

Delete the email without opening the attachment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can’t access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.

As a first responder, which of the following is the next BEST step to perform?

Investigate how the attack occurred.

Hire a forensic team to gather evidence.

Prevent such an incident from occurring again.

Contain the problem

A

Contain the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the best countermeasure against social engineering?

Strong passwords

Access auditing

User awareness training

Acceptable use policy

A

User awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks.

Which of the following does this security threat describe?

Zombie/botnet

Man-in-the-middle

Spoofing

Phishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following describes a Man-in-the-Middle attack?

An IP packet is constructed which is larger than the valid size.

A person over the phone convinces an employee to reveal their logon credentials.

An attacker intercepts communications between two network hosts by impersonating each host.

Malicious code is planted on a system where it waits for a triggering event before activating.

A

An attacker intercepts communications between two network hosts by impersonating each host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Power outage

Denial-of-service

Data redundancy

Wiretapping

A

Power outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do biometrics use to perform authentication of identity?

Ability to perform tasks

Biological attributes

Knowledge of passwords

Possession of a device

A

Biological attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.

Which of the following security practices was violated?

Entry control roster

Strong password policy

Principle of least privilege

Multifactor authentication

A

Principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?

Authorization

Accounting

Access control

Authentication

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

Authentication

Non-repudiation

Integrity

Authorization

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following security measures is a form of biometrics?

TPM

Chassis intrusion detection

Fingerprint scanner

BIOS password

A

Fingerprint scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is not a form of biometrics?

Face recognition

Smart card

Retina scan

Fingerprint

A

Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Your company wants to use multifactor authentication. Which of the following would you most likely suggest?

Token and smartphone

Fingerprint and retinal scan

Password and passphrase

PIN and smart card

A

PIN and smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ted, an employee in the Sales department has asked a coworker, Ann, in the Production department to update the product descriptions contained in a Sales document. Ann can open the file but, after making changes, can’t save the file.

Which of the following digital security methods is MOST likely preventing this?

Antivirus software

Multifactor authentication

Directory permission

Data loss prevention

A

Directory permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following access controls gives only backup administrators access to all servers on the network?

Authorization

Mandatory

Discretionary

Role-based

A

Role-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user’s mobile phone.

Which of the following digital security methods is being used?

Firewall

DLP

Smart card

Multifactor authentication

A

Multifactor authentication

21
Q

An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client’s email system does not allow them to receive attachments due to their company security policies. Which of the following should the accountant use to send the email?

Host-based firewall

Plain text

File level encryption

Cipher text

A

Cipher text

22
Q

While configuring a wireless access point device, a technician is presented with several security mode options.

Which of the following options will provide the most secure access?

WPA and TKIP

WEP 128

WPA2 and TKIP

WPA2 and AES

WPA and AES

A

WPA2 and AES

23
Q

The CEO of a small business travels extensively and is worried about having the information on their laptop stolen if the laptop is lost or stolen. Which of the following would BEST protect the data from being compromised if the laptop is lost or stolen?

Anti-malware

Anti-theft lock

Full disk encryption

Complex password

A

Full disk encryption

24
Q

A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available.

Which of the following should the technician configure?

Hotspot

VPN

IMAP

Bluetooth

A

VPN

25
Q

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened.
Which of the following email protocols is being used?

IMEI

POP3

IMAP

S/MIME

A

S/MIME

26
Q

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used?

WPA

WPA2

WPS

WEP

A

WPA2

27
Q

Which of the following protocols can be enabled so email is encrypted on a mobile device?

POP3

SMTP

IMAP

SSL

A

SSL

28
Q

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?

Mandatory Access Control (MAC)

Single sign-on

Multifactor authentication

VPN

A

VPN

29
Q

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver?

Cipher text

Plain text

AES encrypted message

WPA2 encryption

A

Plain text

30
Q

Which Internet protocol is used to transmit encrypted data?

HTTPS

FTP

HTTP

DNS

A

HTTPS

31
Q

A technician is installing a new SOHO wireless router.

Which of the following is the FIRST thing the technician should do to secure the router?

Press the WPS button

Adjust the radio power levels

Change the router’s default password

Disable SSID broadcast

A

Change the router’s default password

32
Q

The password policy below incorporates the following:

Passwords must include at least one capital letter
Passwords must include a mix of letters and numbers
Passwords must be different from the past eight passwords
Passwords must contain at least one non-alphanumeric character
Which of the following password best practices are being used? (Select TWO).

Password lockout

Password length

Password expiration

Password history

Password age

Password complexity

A

Password complexity

Password history

33
Q

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three unsuccessful logon attempts.

Which of the following policies are BEST to configure? (Select TWO).

Account lockout threshold

Maximum password age

Password complexity

Minimum password length

Enforce password history

Account lockout duration

A

Minimum password length

Account lockout threshold

34
Q

Why is it better to use a credit card than a debit card for online purchases?

Credit cards have better fraud protection

Credit cards keep track of all your transactions

Debit cards require you to pay additional fees

Credit cards have better interest rates

A

Credit cards have better fraud protection

35
Q

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again.

Which of the following policies are BEST to configure? (Select TWO).

Enforce password history

Minimum password age

Password complexity

Maximum password age

Minimum password length

A

Enforce password history

Minimum password age

36
Q

Which of the following components of a successful access control framework is the process of proving that you are who you say you are?

Authentication

Accounting

Access control

Authorization

A

Authentication

37
Q

You’ve just received an email message that indicates a new, serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat.

Based on the email message, which of the following are the next BEST actions to complete? (Select two.)

Distribute the message to everyone in your address book.

Run a full anti-malware scan.

Delete the indicated files if present.

Verify the information on well-known malicious code threat management Web sites.

Perform a complete system backup.

Reboot the system.

A

Verify the information on well-known malicious code threat management Web sites.

Run a full anti-malware scan.

38
Q

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _________.

Spam

Bloatware

Cookies

Illegal messages

A

Spam

39
Q

Which software is Microsoft’s anti-malware product that is preinstalled on most new computers?

ESET NOD32

Windows Defender

Norton Antivirus

McAfee VirusScan

A

Windows Defender

40
Q

Which of the following would best prevent an unauthorized person from remotely accessing your computer?

Lockdown device

Firewall

Anti-spam software

Anti-malware software

A

Firewall

41
Q

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information.

To properly protect the accidental discovery of the company’s sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Delete user data and applications from the hard drives

Use data wiping software to clear the hard drives

Include the original operating system discs and product keys with the computers

Reformat the hard drives

A

Use data wiping software to clear the hard drives

42
Q

Which of the following disaster recovery concepts applies when a server needs to be online and accessible at all times?

Cloud storage

Backup

Replication

Redundancy

A

Redundancy

43
Q

Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?

Fault tolerance

Cloud backups

Prioritization

Business Plan

A

Prioritization

44
Q

What is a disadvantage of using the cloud for data storage?

Cloud storage backups require a reliable internet connection.

Cloud storage can fulfill the requirements for offsite backups.

You can access files from any computer with an internet connection.

Cloud storage allows you to save files to the interne

A

Cloud storage backups require a reliable internet connection.

45
Q

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues.

Which of the following is the BEST action to take?

Ignore the paper and tell no one of its contents.

Give your friend a heads up about what you found, but don’t disclose from where you heard the information.

Tell your fellow PC technicians about what you saw and let them decide what to do with the information.

Tell your friend about the report you saw and whose desk it was on.

A

Ignore the paper and tell no one of its contents.

46
Q

Even if you perform regular backups, what must be done to ensure that you are protected against data loss?

Regularly test restoration procedures.

Write-protect all backup media.

Restrict restoration privileges to system administrators.

Configure System Maintenance to automatically defragment system hard drives every night.

A

Regularly test restoration procedures.

47
Q

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely backup important data to the Cloud.

Don’t put important information on your mobile device.

Configure your device to backup important data to your personal computer.

Only use apps, such as email apps, that store data on the app provider’s servers.

A

Configure your device to remotely backup important data to the Cloud.

48
Q

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon.

Which of the following steps have you forgotten in your troubleshooting process?

Create an action plan.

Perform a backup.

Verify system functionality.

Implement the solution.

A

Perform a backup.

49
Q

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location.

Where would be the next best place to keep your backup media?

In a drawer in your office.

In a locked room.

On a shelf next to the backup device.

In a locked fireproof safe.

A

In a locked fireproof safe.