Advertisement
Guest User

info sec

a guest
Jan 12th, 2017
1,021
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 38.07 KB | None | 0 0
  1. Question 1
  2. 0 out of 2 points
  3. Incorrect
  4. Password cracking depends on what two things? (Select two answers!)
  5.  
  6. Selected Answers:
  7. Incorrect [None Given]
  8. Answers:
  9. Correct
  10. Power
  11. Correct
  12. Efficiency
  13. Skill
  14. Ability
  15. Question 2
  16. 0 out of 2 points
  17. Incorrect
  18. A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.
  19. Selected Answer:
  20. Incorrect [None Given]
  21. Answers:
  22. a. policy
  23. b. guideline
  24. c. role book
  25. Correctd. standard
  26. Question 3
  27. 0 out of 2 points
  28. Incorrect
  29. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.
  30. Selected Answer:
  31. Incorrect [None Given]
  32. Answers:
  33. a. hacking kit
  34. Correctb. rootkit
  35. c. worm
  36. d. virus
  37. Question 4
  38. 0 out of 4 points
  39. Incorrect
  40. Match each term with the correct statement below.
  41.  
  42. Question Correct Match Selected Match
  43. A general term that refers to a wide variety of damaging or annoying attack software programs
  44.  
  45. Correct f.
  46. Malware
  47. [None Given]
  48. General term used to describe software that spies on users by gathering information without consent, thus violating their privacy
  49.  
  50. Correct d.
  51. Spyware
  52. [None Given]
  53. Virus that first attaches itself to the end of a file
  54.  
  55. Correct g.
  56. Appender infection
  57. [None Given]
  58. Software program that delivers advertising content in a manner that is unexpected and unwanted by the user
  59.  
  60. Correct a.
  61. Adware
  62. [None Given]
  63. Attacker in control of botnets
  64.  
  65. Correct c.
  66. Bot herder
  67. [None Given]
  68. Written in a script to automate a complex series of tasks into one command
  69.  
  70. Correct b.
  71. Macro virus
  72. [None Given]
  73. One of the first viruses found on a microcomputer
  74.  
  75. Correct h.
  76. Elk Cloner
  77. [None Given]
  78. Also called a remote code execution, or RCE
  79.  
  80. Correct e.
  81. Arbitrary code execution
  82. [None Given]
  83. An agent that reproduces inside a cell
  84.  
  85. Correct i.
  86. Biological virus
  87. [None Given]
  88. All Answer Choices
  89. a.
  90. Adware
  91. b.
  92. Macro virus
  93. c.
  94. Bot herder
  95. d.
  96. Spyware
  97. e.
  98. Arbitrary code execution
  99. f.
  100. Malware
  101. g.
  102. Appender infection
  103. h.
  104. Elk Cloner
  105. i.
  106. Biological virus
  107. Question 5
  108. 0 out of 2 points
  109. Incorrect
  110. ____ is the process of setting a user’s account to expire.
  111. Selected Answer:
  112. Incorrect [None Given]
  113. Answers:
  114. Correcta. Account expiration
  115. b. Password expiration
  116. c. Account renewal
  117. d. Password aging
  118. Question 6
  119. 0 out of 2 points
  120. Incorrect
  121. ____ cryptography uses same single key to encrypt and decrypt a document.
  122. Selected Answer:
  123. Incorrect [None Given]
  124. Answers:
  125. a. Pair key
  126. Correctb. Private key
  127. c. Asymmetric
  128. d. Public key
  129. Question 7
  130. 0 out of 2 points
  131. Incorrect
  132. The practice called “____” requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.
  133. Selected Answer:
  134. Incorrect [None Given]
  135. Answers:
  136. a. least privilege
  137. Correctb. separation of duties
  138. c. multifactor authentication
  139. d. job rotation
  140. Question 8
  141. 0 out of 2 points
  142. Incorrect
  143. Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.
  144. Selected Answer:
  145. Incorrect [None Given]
  146. Answers:
  147. Correcta. whole disk
  148. b. file
  149. c. data
  150. d. file system
  151. Question 9
  152. 0 out of 1 points
  153. Incorrect
  154. Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.
  155. Selected Answer:
  156. Incorrect [None Given]
  157. Answers:
  158. Correcta. protocols
  159. b. scripting
  160. c. languages
  161. d. interfaces
  162. Question 10
  163. 0 out of 1 points
  164. Incorrect
  165. Attack tools can initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.
  166. Selected Answer:
  167. Incorrect [None Given]
  168. Answers:
  169. Correct True
  170. False
  171. Question 11
  172. 0 out of 1.5 points
  173. Incorrect
  174. Which of the following is NOT an example of an authorization technique or device?
  175.  
  176. Selected Answer:
  177. Incorrect [None Given]
  178. Answers:
  179. A key fob showing something you have
  180. Facial recognition showing something you are
  181. Correct
  182. A survey on your political beliefs based on what you think
  183. A combination lock showing what you know
  184. Question 12
  185. 0 out of 1 points
  186. Incorrect
  187. On average it takes ____ days for a victim to recover from an attack.
  188. Selected Answer:
  189. Incorrect [None Given]
  190. Answers:
  191. a. three
  192. b. five
  193. c. eight
  194. Correctd. ten
  195. Question 13
  196. 0 out of 1.5 points
  197. Incorrect
  198. ____ is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise, in an attempt to trick the user into surrendering private information.
  199. Selected Answer:
  200. Incorrect [None Given]
  201. Answers:
  202. a. Pharming
  203. Correctb. Phishing
  204. c. Flashing
  205. d. Polling
  206. Question 14
  207. 0 out of 2 points
  208. Incorrect
  209. A ____ is a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer.
  210. Selected Answer:
  211. Incorrect [None Given]
  212. Answers:
  213. Correcta. worm
  214. b. mass-mailer
  215. c. virus
  216. d. Trojan horse
  217. Question 15
  218. 0 out of 2 points
  219. Incorrect
  220. As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security.
  221. Selected Answer:
  222. Incorrect [None Given]
  223. Answers:
  224. a. security scripts
  225. b. batch configuration
  226. Correctc. Wi-Fi Protected Setup (WPS)
  227. d. PIN numbers
  228. Question 16
  229. 0 out of 2 points
  230. Incorrect
  231. On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen.
  232. Selected Answer:
  233. Incorrect [None Given]
  234. Answers:
  235. a. tracking
  236. b. auto-lock
  237. Correctc. remote wipe
  238. d. encryption
  239. Question 17
  240. 0 out of 1.5 points
  241. Incorrect
  242. The best approach to establishing strong security with passwords is to use a ____.
  243. Selected Answer:
  244. Incorrect [None Given]
  245. Answers:
  246. a. password fault program
  247. b. password vault program
  248. Correctc. password management tool
  249. d. password generation program
  250. Question 18
  251. 0 out of 1.5 points
  252. Incorrect
  253. Files backed up through online services can be made available to another computer.
  254. Selected Answer:
  255. Incorrect [None Given]
  256. Answers:
  257. Correct True
  258. False
  259. Question 19
  260. 0 out of 2 points
  261. Incorrect
  262. ____ cryptography uses two different keys.
  263.  
  264. Selected Answer:
  265. Incorrect [None Given]
  266. Answers:
  267. a.
  268. Symmetric
  269. b.
  270. Private key
  271. Correctc.
  272. Asymmetric
  273. d.
  274. Protected key
  275. Question 20
  276. 0 out of 1.5 points
  277. Incorrect
  278. The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____.
  279. Selected Answer:
  280. Incorrect [None Given]
  281. Answers:
  282. a. affiliate network sites
  283. b. social marketing sites
  284. Correctc. social networking sites
  285. d. affiliation sites
  286. Question 21
  287. 0 out of 1 points
  288. Incorrect
  289. FACTA grants consumers free access to their credit score.
  290. Selected Answer:
  291. Incorrect [None Given]
  292. Answers:
  293. True
  294. Correct False
  295. Question 22
  296. 0 out of 2 points
  297. Incorrect
  298. ____ attacks are often the means by which an attacker will perform an arbitrary code execution.
  299. Selected Answer:
  300. Incorrect [None Given]
  301. Answers:
  302. a. Stack overflow
  303. b. Heap overflow
  304. c. Block overflow
  305. Correctd. Buffer overflow
  306. Question 23
  307. 0 out of 2 points
  308. Incorrect
  309. A ____ is a document that outlines specific requirements or rules that must be met.
  310. Selected Answer:
  311. Incorrect [None Given]
  312. Answers:
  313. a. guideline
  314. b. role book
  315. Correctc. policy
  316. d. standard
  317. Question 24
  318. 0 out of 2 points
  319. Incorrect
  320. IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.
  321. Selected Answer:
  322. Incorrect [None Given]
  323. Answers:
  324. a. 802.11ab
  325. b. 802.11ac
  326. c. 802.11n
  327. Correctd. 802.11g
  328. Question 25
  329. 0 out of 1 points
  330. Incorrect
  331. Today, many attack tools are freely available and do not require any technical knowledge to use.
  332. Selected Answer:
  333. Incorrect [None Given]
  334. Answers:
  335. Correct True
  336. False
  337. Question 26
  338. 0 out of 2 points
  339. Incorrect
  340. What is curently the best option for Wi-Fi security?
  341.  
  342. Selected Answer:
  343. Incorrect [None Given]
  344. Answers:
  345. WEP
  346. WPA3
  347. Correct
  348. WPA2
  349. SSID
  350. Question 27
  351. 0 out of 2 points
  352. Incorrect
  353. ____ is a general term that refers to a wide variety of damaging or annoying software programs.
  354. Selected Answer:
  355. Incorrect [None Given]
  356. Answers:
  357. a. Bloatware
  358. Correctb. Malware
  359. c. Harmware
  360. d. Trashware
  361. Question 28
  362. 0 out of 1.5 points
  363. Incorrect
  364. Unless remote management is essential, it is recommended that this feature be disabled with a wireless router.
  365. Selected Answer:
  366. Incorrect [None Given]
  367. Answers:
  368. Correct True
  369. False
  370. Question 29
  371. 0 out of 2 points
  372. Incorrect
  373. In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.
  374. Selected Answer:
  375. Incorrect [None Given]
  376. Answers:
  377. Correcta. IEEE
  378. b. W3C
  379. c. IETF
  380. d. ACM
  381. Question 30
  382. 0 out of 1 points
  383. Incorrect
  384. Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.
  385. Selected Answer:
  386. Incorrect [None Given]
  387. Answers:
  388. a. tools
  389. b. applications
  390. Correctc. people
  391. d. systems
  392. Question 31
  393. 0 out of 2 points
  394. Incorrect
  395. Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. This is known as ____.
  396. Selected Answer:
  397. Incorrect [None Given]
  398. Answers:
  399. a. spamming
  400. b. manipulating online polls
  401. c. spreading malware
  402. Correctd. denying services
  403. Question 32
  404. 0 out of 1 points
  405. Incorrect
  406. Financial cybercrime is often divided into two categories. The first category focuses on individuals and businesses.
  407. Selected Answer:
  408. Incorrect [None Given]
  409. Answers:
  410. Correct True
  411. False
  412. Question 33
  413. 0 out of 2 points
  414. Incorrect
  415. Private key cryptography is also called ____ cryptography.
  416. Selected Answer:
  417. Incorrect [None Given]
  418. Answers:
  419. a. peer-to-peer
  420. Correctb. symmetric
  421. c. protected
  422. d. asymmetric
  423. Question 34
  424. 0 out of 1 points
  425. Incorrect
  426. Passwords are still considered a strong defense against attackers.
  427. Selected Answer:
  428. Incorrect [None Given]
  429. Answers:
  430. True
  431. Correct False
  432. Question 35
  433. 0 out of 1 points
  434. Incorrect
  435. A computer ____ is a person who has been hired to break into a computer and steal information.
  436. Selected Answer:
  437. Incorrect [None Given]
  438. Answers:
  439. Correcta. spy
  440. b. hacker
  441. c. worm
  442. d. mole
  443. Question 36
  444. 0 out of 1.5 points
  445. Incorrect
  446. The ____ of 2003 contains rules regarding consumer privacy.
  447. Selected Answer:
  448. Incorrect [None Given]
  449. Answers:
  450. a. Accurate Transactions Act
  451. b. Fair Credit Reporting Act
  452. Correctc. Fair and Accurate Credit Transactions Act
  453. d. Credit and Transactions Act
  454. Question 37
  455. 0 out of 1.5 points
  456. Incorrect
  457. Grouping individuals and organizations into clusters or groups based on their likes and interests is called ____.
  458. Selected Answer:
  459. Incorrect [None Given]
  460. Answers:
  461. a. affiliate marketing
  462. b. social marketing
  463. Correctc. social networking
  464. d. affiliate networking
  465. Question 38
  466. 0 out of 1.5 points
  467. Incorrect
  468. Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.
  469. Selected Answer:
  470. Incorrect [None Given]
  471. Answers:
  472. a. vishing
  473. b. whaling
  474. Correctc. pharming
  475. d. spear phishing
  476. Question 39
  477. 0 out of 1.5 points
  478. Incorrect
  479. Which of the following is NOT generally a good method to be successful in a Social Engineering attack?
  480.  
  481. Selected Answer:
  482. Incorrect [None Given]
  483. Answers:
  484. Flattery
  485. Correct
  486. Quickly getting the information from the victim
  487. Impersonating a person of authority
  488. Gaining the victim's trust
  489. Question 40
  490. 0 out of 2 points
  491. Incorrect
  492. There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.
  493. Selected Answer:
  494. Incorrect [None Given]
  495. Answers:
  496. Correcta. Bluetooth
  497. b. 4G LTE
  498. c. GSM
  499. d. 3G
  500. Question 41
  501. 0 out of 2 points
  502. Incorrect
  503. A ____ is a collection of suggestions that should be implemented.
  504. Selected Answer:
  505. Incorrect [None Given]
  506. Answers:
  507. a. standard
  508. b. policy
  509. c. role book
  510. Correctd. guideline
  511. Question 42
  512. 0 out of 2 points
  513. Incorrect
  514. ____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
  515. Selected Answer:
  516. Incorrect [None Given]
  517. Answers:
  518. a. Bluesnarfing
  519. Correctb. Bluejacking
  520. c. Bluephishing
  521. d. Bluesurfing
  522. Question 43
  523. 0 out of 1 points
  524. Incorrect
  525. In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.
  526. Selected Answer:
  527. Incorrect [None Given]
  528. Answers:
  529. a. black-hat
  530. b. slacker
  531. c. white-hat
  532. Correctd. hacker
  533. Question 44
  534. 0 out of 1 points
  535. Incorrect
  536. There is a straightforward and easy solution to securing computers.
  537. Selected Answer:
  538. Incorrect [None Given]
  539. Answers:
  540. True
  541. Correct False
  542. Question 45
  543. 0 out of 1 points
  544. Incorrect
  545. ____ are individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.
  546. Selected Answer:
  547. Incorrect [None Given]
  548. Answers:
  549. a. Hackers
  550. b. Elites
  551. c. Crackers
  552. Correctd. Script kiddies
  553. Question 46
  554. 0 out of 2 points
  555. Incorrect
  556. One of the best defenses against attacks is to create ____ on a regular basis.
  557. Selected Answer:
  558. Incorrect [None Given]
  559. Answers:
  560. a. restore disks
  561. Correctb. data backups
  562. c. system documentation
  563. d. recovery disks
  564. Question 47
  565. 0 out of 1 points
  566. Incorrect
  567. Virtually anyone could type in a person’s username and pretend to be that person.
  568. Selected Answer:
  569. Incorrect [None Given]
  570. Answers:
  571. Correct True
  572. False
  573. Question 48
  574. 0 out of 1.5 points
  575. Incorrect
  576. ____ may reveal the true level of security within the organization.
  577. Selected Answer:
  578. Incorrect [None Given]
  579. Answers:
  580. a. Phone directories
  581. b. System manuals
  582. Correctc. Policy manuals
  583. d. Organizational charts
  584. Question 49
  585. 0 out of 2 points
  586. Incorrect
  587. ____ is software that displays a fictitious warning to the user in the attempt to “scare” the user into an action, such as purchasing additional software online to fix a problem that in fact does not exist.
  588. Selected Answer:
  589. Incorrect [None Given]
  590. Answers:
  591. a. Adware
  592. b. Trojan
  593. c. Spyware
  594. Correctd. Scareware
  595. Question 50
  596. 0 out of 2 points
  597. Incorrect
  598. A(n) ____ account is designed for everyday computing activities and allows for some settings to be modified.
  599. Selected Answer:
  600. Incorrect [None Given]
  601. Answers:
  602. a. guest
  603. b. system
  604. c. administrator
  605. Correctd. standard
  606. Question 51
  607. 0 out of 2 points
  608. Incorrect
  609. ____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
  610. Selected Answer:
  611. Incorrect [None Given]
  612. Answers:
  613. a. Bluejacking
  614. Correctb. Bluesnarfing
  615. c. Bluesurfing
  616. d. Bluephising
  617. Question 52
  618. 0 out of 1.5 points
  619. Incorrect
  620. Data backups only protect data against computer attacks.
  621. Selected Answer:
  622. Incorrect [None Given]
  623. Answers:
  624. True
  625. Correct False
  626. Question 53
  627. 0 out of 4 points
  628. Incorrect
  629. Match each term with the correct statement below.
  630. Question Correct Match Selected Match
  631. provides the optimum level of wireless security and has been mandatory for all certified wireless devices manufactured since March 2006.
  632. Correct g. WPA2
  633. [None Given]
  634. a traditional cellular telephone that includes a limited number of features.
  635. Correct d. Feature phone
  636. [None Given]
  637. used to send and receive wireless signals
  638. Correct e. Wireless adapter
  639. [None Given]
  640. short-range wireless technology designed for interconnecting computers and peripherals, handheld devices, and cell phones.
  641. Correct b. Bluetooth
  642. [None Given]
  643. searching for wireless signals from an automobile or on foot using a portable computing device.
  644. Correct c. War driving
  645. [None Given]
  646. a radical technology or innovation that fills a new role that an existing device or technology could not.
  647. Correct i. Disruptive technology
  648. [None Given]
  649. an AP or another computer that is set up by an attacker designed to mimic an authorized Wi-Fi device.
  650. Correct f. Evil twin
  651. [None Given]
  652. most widely used type of wireless network.
  653. Correct a. 802.11n
  654. [None Given]
  655. portable computing devices with screen sizes ranging from 5 to 10 inches (127 to 254 millimeters).
  656. Correct h. Tablet computers
  657. [None Given]
  658. All Answer Choices
  659. a. 802.11n
  660. b. Bluetooth
  661. c. War driving
  662. d. Feature phone
  663. e. Wireless adapter
  664. f. Evil twin
  665. g. WPA2
  666. h. Tablet computers
  667. i. Disruptive technology
  668. Question 54
  669. 0 out of 1 points
  670. Incorrect
  671. “____” involves breaking into a car’s electronic system.
  672. Selected Answer:
  673. Incorrect [None Given]
  674. Answers:
  675. a. Joyriding
  676. Correctb. Car hacking
  677. c. Car hijack
  678. d. Car riding
  679. Question 55
  680. 0 out of 1 points
  681. Incorrect
  682. The weakness of passwords centers on human memory.
  683. Selected Answer:
  684. Incorrect [None Given]
  685. Answers:
  686. Correct True
  687. False
  688. Question 56
  689. 0 out of 1.5 points
  690. Incorrect
  691. To address the vulnerabilities in operating systems that are uncovered after the software has been released, software vendors usually deploy a software “fix” to address the vulnerabilities.
  692. Selected Answer:
  693. Incorrect [None Given]
  694. Answers:
  695. Correct True
  696. False
  697. Question 57
  698. 0 out of 1 points
  699. Incorrect
  700. A recent vulnerability known as ______________ has effected a majority of web sites and the very foundation on which secuirty on the Internet is built by making SSL vulnerable to attack.
  701.  
  702. Selected Answer:
  703. Incorrect [None Given]
  704. Answers:
  705. Flashback
  706. Correct
  707. Heartbleed
  708. Shell Shock
  709. Rocket Raccoon
  710. Question 58
  711. 0 out of 2 points
  712. Incorrect
  713. The ____ team is contacted whenever digital evidence needs to be preserved and serve as first responders.
  714. Selected Answer:
  715. Incorrect [None Given]
  716. Answers:
  717. Correcta. computer forensics response
  718. b. incident forensics response
  719. c. computer security incident response
  720. d. computer security
  721. Question 59
  722. 0 out of 1 points
  723. Incorrect
  724. ____ ensures that information is correct and no unauthorized person or malicious software has altered that data.
  725. Selected Answer:
  726. Incorrect [None Given]
  727. Answers:
  728. Correcta. Integrity
  729. b. Availability
  730. c. Protection
  731. d. Confidentiality
  732. Question 60
  733. 0 out of 1.5 points
  734. Incorrect
  735. ____ identify individuals within the organization who are in positions of authority.
  736. Selected Answer:
  737. Incorrect [None Given]
  738. Answers:
  739. a. Policy manuals
  740. b. System manuals
  741. Correctc. Organizational charts
  742. d. Phone directories
  743. Question 61
  744. 0 out of 1.5 points
  745. Incorrect
  746. Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide “cells” or areas of coverage.
  747. Selected Answer:
  748. Incorrect [None Given]
  749. Answers:
  750. Correct True
  751. False
  752. Question 62
  753. 0 out of 1 points
  754. Incorrect
  755. A(n) ____ is a person or element that has the power to carry out a threat.
  756. Selected Answer:
  757. Incorrect [None Given]
  758. Answers:
  759. Correcta. threat agent
  760. b. risk
  761. c. attack agent
  762. d. vulnerability
  763. Question 63
  764. 0 out of 2 points
  765. Incorrect
  766. ____ are independently rotating large cups (in diameter of 5 inches or 115 millimeters) affixed to the top of a fence to prevent the hands of intruders from gripping the top of a fence to climb over it.
  767. Selected Answer:
  768. Incorrect [None Given]
  769. Answers:
  770. a. Anti-climb spikes
  771. Correctb. Roller barriers
  772. c. Rotating spikes
  773. d. Anti-climb collars
  774. Question 64
  775. 0 out of 1 points
  776. Incorrect
  777. In the last year, over 600,000 Apple Macs were infected with a malicious software called ____.
  778. Selected Answer:
  779. Incorrect [None Given]
  780. Answers:
  781. Correcta. Flashback
  782. b. Slapper
  783. c. Melissa
  784. d. Morris
  785. Question 65
  786. 0 out of 1.5 points
  787. Incorrect
  788. Bruce Shneier suggest which password generation method?
  789.  
  790. Selected Answer:
  791. Incorrect [None Given]
  792. Answers:
  793. Creating a 12 word seeded pass phrase
  794. Correct
  795. Combine a personally memorable sentence with some memorable tricks to modify that sentence into a password
  796. The Person-Object-Action method
  797. The Stem and Branch method
  798. Question 66
  799. 0 out of 1 points
  800. Incorrect
  801. Security ____ convenience.
  802. Selected Answer:
  803. Incorrect [None Given]
  804. Answers:
  805. a. is proportional to
  806. Correctb. is inversely proportional to
  807. c. should be subservient to
  808. d. cannot coexist with
  809. Question 67
  810. 0 out of 1 points
  811. Incorrect
  812. Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
  813. Selected Answer:
  814. Incorrect [None Given]
  815. Answers:
  816. a. COPPA
  817. b. Sarbox
  818. Correctc. HIPAA
  819. d. GLBA
  820. Question 68
  821. 0 out of 1.5 points
  822. Incorrect
  823. ____ involves using someone’s personal information, such as a Social Security number, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating.
  824. Selected Answer:
  825. Incorrect [None Given]
  826. Answers:
  827. a. Identity borrowing
  828. b. Information theft
  829. Correctc. Identity theft
  830. d. Property theft
  831. Question 69
  832. 0 out of 2 points
  833. Incorrect
  834. A security ____ is a general software security update intended to cover vulnerabilities that have been discovered since the program was released.
  835. Selected Answer:
  836. Incorrect [None Given]
  837. Answers:
  838. a. repair
  839. b. control
  840. c. hole
  841. Correctd. patch
  842. Question 70
  843. 0 out of 2 points
  844. Incorrect
  845. Spyware usually performs one of the following functions on a user’s computer: ____, collecting personal information, or changing computer configurations.
  846. Selected Answer:
  847. Incorrect [None Given]
  848. Answers:
  849. a. capturing screens
  850. b. deleting files
  851. c. keylogging
  852. Correctd. advertising
  853. Question 71
  854. 0 out of 1.5 points
  855. Incorrect
  856. Whereas tablets are designed for performance, laptops are focused on ease of use.
  857. Selected Answer:
  858. Incorrect [None Given]
  859. Answers:
  860. True
  861. Correct False
  862. Question 72
  863. 0 out of 2 points
  864. Incorrect
  865. A ____ is created when hundreds, thousands, or even tens of thousands of zombie computers are manipulated under remote control.
  866. Selected Answer:
  867. Incorrect [None Given]
  868. Answers:
  869. a. adnet
  870. b. wormnet
  871. Correctc. botnet
  872. d. malnet
  873. Question 73
  874. 0 out of 2 points
  875. Incorrect
  876. On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time.
  877. Selected Answer:
  878. Incorrect [None Given]
  879. Answers:
  880. a. auto-screen-off
  881. b. auto-sleep
  882. Correctc. auto-lock
  883. d. auto-password
  884. Question 74
  885. 0 out of 1 points
  886. Incorrect
  887. The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
  888. Selected Answer:
  889. Incorrect [None Given]
  890. Answers:
  891. a. network security
  892. b. information assurance
  893. Correctc. information security
  894. d. information warfare
  895. Question 75
  896. 0 out of 2 points
  897. Incorrect
  898. A(n) ____ infection injects portions of the code throughout the program’s executable code instead of only at the end of the file (any overwritten original code is transferred and stored inside the virus code for proper execution of the host program after the infection).
  899. Selected Answer:
  900. Incorrect [None Given]
  901. Answers:
  902. a. polymorphic
  903. b. appender
  904. Correctc. Swiss cheese
  905. d. replace
  906. Question 76
  907. 0 out of 2 points
  908. Incorrect
  909. One of the first software security applications is ____ software.
  910. Selected Answer:
  911. Incorrect [None Given]
  912. Answers:
  913. a. host prevention
  914. Correctb. antivirus
  915. c. firewall
  916. d. antispyware
  917. Question 77
  918. 0 out of 2 points
  919. Incorrect
  920. A(n) ____ address is a unique hardware number that is “burned in” to each wireless network interface card adapter.
  921. Selected Answer:
  922. Incorrect [None Given]
  923. Answers:
  924. a. WPS
  925. b. WPA2
  926. Correctc. MAC
  927. d. SSID
  928. Question 78
  929. 0 out of 3 points
  930. Incorrect
  931. Match each term with the correct statement below.
  932. Question Correct Match Selected Match
  933. Due to overwhelmed vendors trying to keep pace by updating their products against attacks
  934. Correct a. Delays in security updating
  935. [None Given]
  936. Potentially the next target for attackers.
  937. Correct i. Personal medical devices
  938. [None Given]
  939. Made possible by new software tools and techniques
  940. Correct d. Faster detection of vulnerabilities
  941. [None Given]
  942. Results in attackers that can launch attacks against millions of computers within minutes
  943. Correct h. Speed of attacks
  944. [None Given]
  945. Results in attack tools that can vary their behavior so the same attack appears differently each time
  946. Correct b. Greater sophistication of attacks
  947. [None Given]
  948. Results in attacks that are no longer limited to highly skilled attackers
  949. Correct f. Simplicity of attack tools
  950. [None Given]
  951. Allows attackers from anywhere in the world can send attacks
  952. Correct c. Universally connected devices
  953. [None Given]
  954. Happens when attackers use thousands of computers in an attack against a single computer or network
  955. Correct e. Distributed attacks
  956. [None Given]
  957. Happens when users are required to make difficult security decisions with little or no instruction
  958. Correct g. User confusion
  959. [None Given]
  960. All Answer Choices
  961. a. Delays in security updating
  962. b. Greater sophistication of attacks
  963. c. Universally connected devices
  964. d. Faster detection of vulnerabilities
  965. e. Distributed attacks
  966. f. Simplicity of attack tools
  967. g. User confusion
  968. h. Speed of attacks
  969. i. Personal medical devices
  970. Question 79
  971. 0 out of 1.5 points
  972. Incorrect
  973. A ____ attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file.
  974. Selected Answer:
  975. Incorrect [None Given]
  976. Answers:
  977. a. man in the middle
  978. Correctb. dictionary
  979. c. hash
  980. d. brute force
  981. Question 80
  982. 0 out of 1 points
  983. Incorrect
  984. ____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
  985. Selected Answer:
  986. Incorrect [None Given]
  987. Answers:
  988. a. HIPAA
  989. b. Sarbox
  990. Correctc. GLBA
  991. d. COPPA
  992. Question 81
  993. 0 out of 1 points
  994. Incorrect
  995. ____ ensures that data is accessible when needed to authorized users.
  996. Selected Answer:
  997. Incorrect [None Given]
  998. Answers:
  999. a. Integrity
  1000. b. Non-repudiation
  1001. Correctc. Availability
  1002. d. Confidentiality
  1003. Question 82
  1004. 0 out of 2 points
  1005. Incorrect
  1006. A ____ is essentially a duplicate of the organization’s main production site and has all the equipment needed for it to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
  1007. Selected Answer:
  1008. Incorrect [None Given]
  1009. Answers:
  1010. a. cold site
  1011. b. warm site
  1012. c. neutral site
  1013. Correctd. hot site
  1014. Question 83
  1015. 0 out of 1 points
  1016. Incorrect
  1017. ____ involves stealing another person’s personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.
  1018. Selected Answer:
  1019. Incorrect [None Given]
  1020. Answers:
  1021. Correcta. Identity theft
  1022. b. Digital fraud
  1023. c. White hat hacking
  1024. d. Cyberterrorism
  1025. Question 84
  1026. 0 out of 2 points
  1027. Incorrect
  1028. A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.
  1029. Selected Answer:
  1030. Incorrect [None Given]
  1031. Answers:
  1032. a. free access network
  1033. Correctb. virtual private network
  1034. c. secure access network
  1035. d. ad hoc network
  1036. Question 85
  1037. 0 out of 1 points
  1038. Incorrect
  1039. From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.
  1040. Selected Answer:
  1041. Incorrect [None Given]
  1042. Answers:
  1043. a. 456,000
  1044. b. 22 million
  1045. Correctc. 562 million
  1046. d. 660 billion
  1047. Question 86
  1048. 0 out of 2 points
  1049. Incorrect
  1050. An infected ‘‘robot’’ computer is known as a ____.
  1051. Selected Answer:
  1052. Incorrect [None Given]
  1053. Answers:
  1054. a. bottle
  1055. b. Trojan horse
  1056. Correctc. zombie
  1057. d. beachhead
  1058. Question 87
  1059. 0 out of 2 points
  1060. Incorrect
  1061. Most passwords are composed of two sections known as _____ and _______. (Select two)
  1062.  
  1063. Selected Answers:
  1064. Incorrect [None Given]
  1065. Answers:
  1066. Correct
  1067. root
  1068. non-ascii characters
  1069. Correct
  1070. appendage
  1071. transformers
  1072. Question 88
  1073. 0 out of 1 points
  1074. Incorrect
  1075. A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.
  1076. Selected Answer:
  1077. Incorrect [None Given]
  1078. Answers:
  1079. Correcta. vulnerability
  1080. b. threat
  1081. c. threat agent
  1082. d. asset
  1083. Question 89
  1084. 0 out of 1.5 points
  1085. Incorrect
  1086. Which of the following is generally NOT a method of password cracking?
  1087.  
  1088. Selected Answer:
  1089. Incorrect [None Given]
  1090. Answers:
  1091. Dictionary Attacks
  1092. Correct
  1093. Online Brute Force
  1094. Offline Brute Force
  1095. Online Dictionary Cycling
  1096. Question 90
  1097. 0 out of 1.5 points
  1098. Incorrect
  1099. Social engineering ____ means to create a fictitious character and then play out the role of that person on a victim.
  1100. Selected Answer:
  1101. Incorrect [None Given]
  1102. Answers:
  1103. a. common roles
  1104. b. identity theft
  1105. Correctc. impersonation
  1106. d. conformity
  1107. Question 91
  1108. 0 out of 1.5 points
  1109. Incorrect
  1110. Whereas phishing involves sending millions of generic e-mail messages to users, ____ targets only specific users.
  1111. Selected Answer:
  1112. Incorrect [None Given]
  1113. Answers:
  1114. Correcta. spear phishing
  1115. b. pharming
  1116. c. vishing
  1117. d. whaling
  1118. Question 92
  1119. 0 out of 1 points
  1120. Incorrect
  1121. The FBI defines ____ as any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”
  1122. Selected Answer:
  1123. Incorrect [None Given]
  1124. Answers:
  1125. a. cyberware
  1126. Correctb. cyberterrorism
  1127. c. information warfare
  1128. d. eTerrorism
  1129. Question 93
  1130. 0 out of 1 points
  1131. Incorrect
  1132. Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as ____.
  1133. Selected Answer:
  1134. Incorrect [None Given]
  1135. Answers:
  1136. a. hacktivists
  1137. Correctb. cyberterrorists
  1138. c. spies
  1139. d. hackers
  1140. Question 94
  1141. 0 out of 2 points
  1142. Incorrect
  1143. ____ is defined as the ability of an organization to maintain its operations and services in the face of a disruptive event.
  1144. Selected Answer:
  1145. Incorrect [None Given]
  1146. Answers:
  1147. a. Disaster planning
  1148. b. Business recovery
  1149. Correctc. Business continuity
  1150. d. Disaster recovery
  1151. Question 95
  1152. 0 out of 2 points
  1153. Incorrect
  1154. A(n) ____ contains an integrated circuit chip, which can hold information, which can then be used as part of the authentication process.
  1155. Selected Answer:
  1156. Incorrect [None Given]
  1157. Answers:
  1158. a. OTP
  1159. b. multifactor token
  1160. c. smart PIN
  1161. Correctd. smart card
  1162. Question 96
  1163. 0 out of 2 points
  1164. Incorrect
  1165. ____ policy creates standards for using corporate e-mail.
  1166. Selected Answer:
  1167. Incorrect [None Given]
  1168. Answers:
  1169. a. Information sensitivity
  1170. b. E-mail retention
  1171. c. Automatically forwarded e-mail
  1172. Correctd. E-mail
  1173. Question 97
  1174. 0 out of 2 points
  1175. Incorrect
  1176. A computer ____ is a program advertised as performing one activity but actually does something else.
  1177. Selected Answer:
  1178. Incorrect [None Given]
  1179. Answers:
  1180. a. rootkit
  1181. b. worm
  1182. c. virus
  1183. Correctd. Trojan
  1184. Question 98
  1185. 0 out of 2 points
  1186. Incorrect
  1187. ____ is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
  1188. Selected Answer:
  1189. Incorrect [None Given]
  1190. Answers:
  1191. a. Roller barrier
  1192. b. Rotating paint
  1193. c. Anti-climb collar
  1194. Correctd. Anti-climb paint
  1195. Question 99
  1196. 0 out of 1 points
  1197. Incorrect
  1198. A(n) ____ is a type of action that has the potential to cause harm.
  1199. Selected Answer:
  1200. Incorrect [None Given]
  1201. Answers:
  1202. a. vulnerability
  1203. Correctb. threat
  1204. c. threat agent
  1205. d. asset
  1206. Question 100
  1207. 0 out of 1 points
  1208. Incorrect
  1209. In a well-run information security program, attacks will never get through security perimeters and local defenses.
  1210. Selected Answer:
  1211. Incorrect [None Given]
  1212. Answers:
  1213. True
  1214. Correct False
  1215. Question 101
  1216. 0 out of 2 points
  1217. Incorrect
  1218. The two types of malware that have the primary objective of infecting a computer system are ____.
  1219. Selected Answer:
  1220. Incorrect [None Given]
  1221. Answers:
  1222. a. worms and spyware
  1223. b. Trojans and adware
  1224. c. viruses and Trojans
  1225. Correctd. viruses and worms
  1226. Question 102
  1227. 0 out of 1.5 points
  1228. Incorrect
  1229. Most viruses can spread to other computers by themselves.
  1230. Selected Answer:
  1231. Incorrect [None Given]
  1232. Answers:
  1233. True
  1234. Correct False
  1235. Question 103
  1236. 0 out of 1.5 points
  1237. Incorrect
  1238. A ____ is a program that lets a user create and store multiple strong passwords in a single user database file that is protected by one strong master password.
  1239. Selected Answer:
  1240. Incorrect [None Given]
  1241. Answers:
  1242. a. password fault program
  1243. b. password vault program
  1244. Correctc. password management application
  1245. d. password generation program
  1246. Question 104
  1247. 0 out of 2 points
  1248. Incorrect
  1249. A botnet consisting of thousands of zombies enables an attacker to send massive amounts of spam. Some botnets can also harvest e-mail addresses. This is known as ____.
  1250. Selected Answer:
  1251. Incorrect [None Given]
  1252. Answers:
  1253. Correcta. spamming
  1254. b. spreading malware
  1255. c. denying services
  1256. d. manipulating online polls
  1257. Question 105
  1258. 0 out of 2 points
  1259. Incorrect
  1260. A(n) ____ is a written document that states how an organization plans to protect the company’s information technology assets.
  1261. Selected Answer:
  1262. Incorrect [None Given]
  1263. Answers:
  1264. a. network policy
  1265. b. asset policy
  1266. Correctc. security policy
  1267. d. information policy
  1268. Question 106
  1269. 0 out of 2 points
  1270. Incorrect
  1271. ____ is the application of science to questions that are of interest to the legal profession.
  1272. Selected Answer:
  1273. Incorrect [None Given]
  1274. Answers:
  1275. a. Applied science
  1276. b. Criminal science
  1277. Correctc. Forensics
  1278. d. Legal science
  1279. Question 107
  1280. 0 out of 1 points
  1281. Incorrect
  1282. An attacker must be highly skilled in technical knowledge and abilities in order to be successful in a Social Engineering attack.
  1283.  
  1284. Selected Answer:
  1285. Incorrect [None Given]
  1286. Answers:
  1287. True
  1288. Correct False
  1289. Question 108
  1290. 0 out of 2 points
  1291. Incorrect
  1292. The ____ in a Wi-Fi network serves as the network name identifier.
  1293. Selected Answer:
  1294. Incorrect [None Given]
  1295. Answers:
  1296. Correcta. SSID
  1297. b. WPS Pin number
  1298. c. MAC address
  1299. d. WPA2 ID
  1300. Question 109
  1301. 0 out of 2 points
  1302. Incorrect
  1303. A ____ self-replicates between computers (from one computer to another).
  1304. Selected Answer:
  1305. Incorrect [None Given]
  1306. Answers:
  1307. a. rootkit
  1308. b. Trojan
  1309. c. virus
  1310. Correctd. worm
  1311. Question 110
  1312. 0 out of 1 points
  1313. Incorrect
  1314. You should always be truthful when answering "secret questions" so that you have a way to reset your passwords should you forget them.
  1315.  
  1316. Selected Answer:
  1317. Incorrect [None Given]
  1318. Answers:
  1319. True
  1320. Correct False
  1321. Question 111
  1322. 0 out of 1.5 points
  1323. Incorrect
  1324. Which of the following is NOT a valid method of authentication?
  1325.  
  1326. Selected Answer:
  1327. Incorrect [None Given]
  1328. Answers:
  1329. What you have
  1330. What you know
  1331. Correct
  1332. What you think
  1333. What you are
  1334. Question 112
  1335. 0 out of 2 points
  1336. Incorrect
  1337. A ____ silently captures and stores each keystroke that a user types on the computer’s keyboard.
  1338. Selected Answer:
  1339. Incorrect [None Given]
  1340. Answers:
  1341. Correcta. keylogger
  1342. b. backdoor
  1343. c. rootkit
  1344. d. worm
  1345. Question 113
  1346. 0 out of 2 points
  1347. Incorrect
  1348. AV software on a computer must have its ____ files regularly updated by downloads from the Internet.
  1349. Selected Answer:
  1350. Incorrect [None Given]
  1351. Answers:
  1352. a. control
  1353. b. program
  1354. c. behavior
  1355. Correctd. signature
  1356. Question 114
  1357. 0 out of 3 points
  1358. Incorrect
  1359. Match each term with the correct statement below.
  1360. Question Correct Match Selected Match
  1361. use of a telephone call instead of e-mail to contact a potential victim
  1362. Correct h. Vishing
  1363. [None Given]
  1364. one type of spear phishing
  1365. Correct e. Whaling
  1366. [None Given]
  1367. information entered is observed by another person
  1368. Correct c. Shoulder surfing
  1369. [None Given]
  1370. any secret combination of letters, numbers, and/or symbols that serves to validate or authenticate a user by what she knows
  1371. Correct d. Password
  1372. [None Given]
  1373. trying to guess a password through combining a systematic combination of characters
  1374. Correct a. Brute force attack
  1375. [None Given]
  1376. means of gathering information for an attack by relying on the weaknesses of individuals
  1377. Correct g. Social engineering
  1378. [None Given]
  1379. WUuAxB2aWBndTf7MfEtm is an example of this
  1380. Correct i. Strong passwords
  1381. [None Given]
  1382. process that confirms a user’s identity
  1383. Correct f. Authentication
  1384. [None Given]
  1385. once an authorized person opens the door then virtually any number of individuals can follow behind and also enter the building or area
  1386. Correct b. Tailgating
  1387. [None Given]
  1388. All Answer Choices
  1389. a. Brute force attack
  1390. b. Tailgating
  1391. c. Shoulder surfing
  1392. d. Password
  1393. e. Whaling
  1394. f. Authentication
  1395. g. Social engineering
  1396. h. Vishing
  1397. i. Strong passwords
  1398. Question 115
  1399. 0 out of 5 points
  1400. Incorrect
  1401. Match each term with the correct statement below.
  1402.  
  1403. Question Correct Match Selected Match
  1404. involves building excess capacity in order to protect against failures
  1405.  
  1406. Correct e.
  1407. Redundancy planning
  1408. [None Given]
  1409. designed to separate a nonsecure area from a secure area
  1410.  
  1411. Correct c.
  1412. Mantrap
  1413. [None Given]
  1414. maintains power to equipment in the event of an interruption in the primary electrical power source.
  1415.  
  1416. Correct h.
  1417. Uninterruptible power supply
  1418. [None Given]
  1419. provides office space but the customer must provide and install all the equipment needed to continue operations
  1420.  
  1421. Correct d.
  1422. Cold site
  1423. [None Given]
  1424. has all of the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data
  1425.  
  1426. Correct g.
  1427. Warm site
  1428. [None Given]
  1429. lock the door but have access to unlock from the outside via a small hole.
  1430.  
  1431. Correct a.
  1432. Privacy locks
  1433. [None Given]
  1434. combination locks that use buttons that must be pushed in the proper sequence to open the door.
  1435.  
  1436. Correct i.
  1437. Cipher locks
  1438. [None Given]
  1439. performs continuous data backups that can be restored immediately
  1440.  
  1441. Correct f.
  1442. CDP
  1443. [None Given]
  1444. latch a door closed yet do not lock it; typically used on hall and closet doors
  1445.  
  1446. Correct b.
  1447. Passage locks
  1448. [None Given]
  1449. All Answer Choices
  1450. a.
  1451. Privacy locks
  1452. b.
  1453. Passage locks
  1454. c.
  1455. Mantrap
  1456. d.
  1457. Cold site
  1458. e.
  1459. Redundancy planning
  1460. f.
  1461. CDP
  1462. g.
  1463. Warm site
  1464. h.
  1465. Uninterruptible power supply
  1466. i.
  1467. Cipher locks
  1468. Question 116
  1469. 0 out of 1.5 points
  1470. Incorrect
  1471. If a consumer finds a problem on her credit report, she must first send a letter to the credit-reporting agency. Under federal law, the agency has ____ days to investigate and respond to the alleged inaccuracy and issue a corrected report.
  1472. Selected Answer:
  1473. Incorrect [None Given]
  1474. Answers:
  1475. a. 15
  1476. Correctb. 30
  1477. c. 45
  1478. d. 60
  1479. Question 117
  1480. 0 out of 2 points
  1481. Incorrect
  1482. ____ policy is a Microsoft Windows feature that provides centralized management and configuration of computers and remote users using the Microsoft directory service Active Directory (AD).
  1483. Selected Answer:
  1484. Incorrect [None Given]
  1485. Answers:
  1486. a. Network security
  1487. b. Server security
  1488. Correctc. Group
  1489. d. Acceptable use
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement