module 8 Flashcards
In which of the following should you expect some privacy?
Emailing an important document to a friend using an employer email system
Sharing a photo through a mobile phone app
Metadata stored by a web browser
Personally identifiable information entered into a human resource database
Personally identifiable information entered into a human resource database
In which of the following situations should you expect total privacy?
Instant messaging
Email messages and attachments
Financial transactions
Social networkin
Financial transactions
Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select two.)
Avoid anti-virus apps
Keep the operating system up to date
Turn off location services
Lock the screen with some form of authentication
Keep an up-to-date remote backup
Keep your device always in your possession
Keep the operating system up to date
Lock the screen with some form of authentication
Which of the following is a common form of social engineering attack?
Stealing the key card of an employee and using that to enter a secured building.
Distributing false information about your organization’s financial status.
Hoax virus information emails.
Using a sniffer to capture network traffic.
Hoax virus information emails.
Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
Open the attachment because he has anti-virus software installed.
Forward the email to a friend and ask for advice.
Reply to the sender and ask if the attachment is safe.
Delete the email without opening the attachment.
Delete the email without opening the attachment.
You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can’t access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.
As a first responder, which of the following is the next BEST step to perform?
Investigate how the attack occurred.
Hire a forensic team to gather evidence.
Prevent such an incident from occurring again.
Contain the problem
Contain the problem
What is the best countermeasure against social engineering?
Strong passwords
Access auditing
User awareness training
Acceptable use policy
User awareness training
A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks.
Which of the following does this security threat describe?
Zombie/botnet
Man-in-the-middle
Spoofing
Phishing
Which of the following describes a Man-in-the-Middle attack?
An IP packet is constructed which is larger than the valid size.
A person over the phone convinces an employee to reveal their logon credentials.
An attacker intercepts communications between two network hosts by impersonating each host.
Malicious code is planted on a system where it waits for a triggering event before activating.
An attacker intercepts communications between two network hosts by impersonating each host.
A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
Power outage
Denial-of-service
Data redundancy
Wiretapping
Power outage
What do biometrics use to perform authentication of identity?
Ability to perform tasks
Biological attributes
Knowledge of passwords
Possession of a device
Biological attributes
A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.
Which of the following security practices was violated?
Entry control roster
Strong password policy
Principle of least privilege
Multifactor authentication
Principle of least privilege
If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?
Authorization
Accounting
Access control
Authentication
Accounting
Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?
Authentication
Non-repudiation
Integrity
Authorization
Non-repudiation
Which of the following security measures is a form of biometrics?
TPM
Chassis intrusion detection
Fingerprint scanner
BIOS password
Fingerprint scanner
Which of the following is not a form of biometrics?
Face recognition
Smart card
Retina scan
Fingerprint
Smart card
Your company wants to use multifactor authentication. Which of the following would you most likely suggest?
Token and smartphone
Fingerprint and retinal scan
Password and passphrase
PIN and smart card
PIN and smart card
Ted, an employee in the Sales department has asked a coworker, Ann, in the Production department to update the product descriptions contained in a Sales document. Ann can open the file but, after making changes, can’t save the file.
Which of the following digital security methods is MOST likely preventing this?
Antivirus software
Multifactor authentication
Directory permission
Data loss prevention
Directory permission
Which of the following access controls gives only backup administrators access to all servers on the network?
Authorization
Mandatory
Discretionary
Role-based
Role-based