Post-Assessment 4 Flashcards

1
Q

A Bluetooth device can transmit ________

A

1 million bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPS pins can be cracked in less than ______

A

4 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A version of the email scam that contacts a potential victim with a telephone call is known as _____

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which new asymmetric cryptographic algorithm uses a different foundation that prime numbers or points on a curve?

A

NTRUEncrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the order of volatility which of the following should be first to be retrieved?

A

Registry, cache and peripheral memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which spam filtering method analyzes every word in each email?

A

Bayesian filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What percent of iOS apps exhibit at least one risky behavior?

A

91

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of commercial lock has a keyed cylinder in both the inside and the outside knobs so that a key is used to lock or unlock both sides independently?

A

Communicating double cylinder lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keccak will become SHA-3. Which of the following is like SHA-3?

A

None of the above. ( SHA-1,MD5,SHA-0 )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

On average ______ percent of all laptops stolen in the US are from public schools.

A

33

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of monitoring methodology uses a baseline?

A

Anomaly-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which ICMP filed identifies the general category of the message?

A

Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following would be found in a phishing attack?

A

All of the above. ( Urgent requests for action, Deceptive web link, Logos that look genuine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should individuals in the immediate vicinity of a potential crime event do:?

A

Damage control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three protections that must be extended over information?

A

Availability, Confidentiality, Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly