Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Question 1
- 0 out of 2 points
- Incorrect
- Password cracking depends on what two things? (Select two answers!)
- Selected Answers:
- Incorrect [None Given]
- Answers:
- Correct
- Power
- Correct
- Efficiency
- Skill
- Ability
- Question 2
- 0 out of 2 points
- Incorrect
- A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. policy
- b. guideline
- c. role book
- Correctd. standard
- Question 3
- 0 out of 2 points
- Incorrect
- A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. hacking kit
- Correctb. rootkit
- c. worm
- d. virus
- Question 4
- 0 out of 4 points
- Incorrect
- Match each term with the correct statement below.
- Question Correct Match Selected Match
- A general term that refers to a wide variety of damaging or annoying attack software programs
- Correct f.
- Malware
- [None Given]
- General term used to describe software that spies on users by gathering information without consent, thus violating their privacy
- Correct d.
- Spyware
- [None Given]
- Virus that first attaches itself to the end of a file
- Correct g.
- Appender infection
- [None Given]
- Software program that delivers advertising content in a manner that is unexpected and unwanted by the user
- Correct a.
- Adware
- [None Given]
- Attacker in control of botnets
- Correct c.
- Bot herder
- [None Given]
- Written in a script to automate a complex series of tasks into one command
- Correct b.
- Macro virus
- [None Given]
- One of the first viruses found on a microcomputer
- Correct h.
- Elk Cloner
- [None Given]
- Also called a remote code execution, or RCE
- Correct e.
- Arbitrary code execution
- [None Given]
- An agent that reproduces inside a cell
- Correct i.
- Biological virus
- [None Given]
- All Answer Choices
- a.
- Adware
- b.
- Macro virus
- c.
- Bot herder
- d.
- Spyware
- e.
- Arbitrary code execution
- f.
- Malware
- g.
- Appender infection
- h.
- Elk Cloner
- i.
- Biological virus
- Question 5
- 0 out of 2 points
- Incorrect
- ____ is the process of setting a user’s account to expire.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. Account expiration
- b. Password expiration
- c. Account renewal
- d. Password aging
- Question 6
- 0 out of 2 points
- Incorrect
- ____ cryptography uses same single key to encrypt and decrypt a document.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Pair key
- Correctb. Private key
- c. Asymmetric
- d. Public key
- Question 7
- 0 out of 2 points
- Incorrect
- The practice called “____” requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. least privilege
- Correctb. separation of duties
- c. multifactor authentication
- d. job rotation
- Question 8
- 0 out of 2 points
- Incorrect
- Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. whole disk
- b. file
- c. data
- d. file system
- Question 9
- 0 out of 1 points
- Incorrect
- Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. protocols
- b. scripting
- c. languages
- d. interfaces
- Question 10
- 0 out of 1 points
- Incorrect
- Attack tools can initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correct True
- False
- Question 11
- 0 out of 1.5 points
- Incorrect
- Which of the following is NOT an example of an authorization technique or device?
- Selected Answer:
- Incorrect [None Given]
- Answers:
- A key fob showing something you have
- Facial recognition showing something you are
- Correct
- A survey on your political beliefs based on what you think
- A combination lock showing what you know
- Question 12
- 0 out of 1 points
- Incorrect
- On average it takes ____ days for a victim to recover from an attack.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. three
- b. five
- c. eight
- Correctd. ten
- Question 13
- 0 out of 1.5 points
- Incorrect
- ____ is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise, in an attempt to trick the user into surrendering private information.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Pharming
- Correctb. Phishing
- c. Flashing
- d. Polling
- Question 14
- 0 out of 2 points
- Incorrect
- A ____ is a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. worm
- b. mass-mailer
- c. virus
- d. Trojan horse
- Question 15
- 0 out of 2 points
- Incorrect
- As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. security scripts
- b. batch configuration
- Correctc. Wi-Fi Protected Setup (WPS)
- d. PIN numbers
- Question 16
- 0 out of 2 points
- Incorrect
- On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. tracking
- b. auto-lock
- Correctc. remote wipe
- d. encryption
- Question 17
- 0 out of 1.5 points
- Incorrect
- The best approach to establishing strong security with passwords is to use a ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. password fault program
- b. password vault program
- Correctc. password management tool
- d. password generation program
- Question 18
- 0 out of 1.5 points
- Incorrect
- Files backed up through online services can be made available to another computer.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correct True
- False
- Question 19
- 0 out of 2 points
- Incorrect
- ____ cryptography uses two different keys.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a.
- Symmetric
- b.
- Private key
- Correctc.
- Asymmetric
- d.
- Protected key
- Question 20
- 0 out of 1.5 points
- Incorrect
- The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. affiliate network sites
- b. social marketing sites
- Correctc. social networking sites
- d. affiliation sites
- Question 21
- 0 out of 1 points
- Incorrect
- FACTA grants consumers free access to their credit score.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- True
- Correct False
- Question 22
- 0 out of 2 points
- Incorrect
- ____ attacks are often the means by which an attacker will perform an arbitrary code execution.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Stack overflow
- b. Heap overflow
- c. Block overflow
- Correctd. Buffer overflow
- Question 23
- 0 out of 2 points
- Incorrect
- A ____ is a document that outlines specific requirements or rules that must be met.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. guideline
- b. role book
- Correctc. policy
- d. standard
- Question 24
- 0 out of 2 points
- Incorrect
- IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. 802.11ab
- b. 802.11ac
- c. 802.11n
- Correctd. 802.11g
- Question 25
- 0 out of 1 points
- Incorrect
- Today, many attack tools are freely available and do not require any technical knowledge to use.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correct True
- False
- Question 26
- 0 out of 2 points
- Incorrect
- What is curently the best option for Wi-Fi security?
- Selected Answer:
- Incorrect [None Given]
- Answers:
- WEP
- WPA3
- Correct
- WPA2
- SSID
- Question 27
- 0 out of 2 points
- Incorrect
- ____ is a general term that refers to a wide variety of damaging or annoying software programs.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Bloatware
- Correctb. Malware
- c. Harmware
- d. Trashware
- Question 28
- 0 out of 1.5 points
- Incorrect
- Unless remote management is essential, it is recommended that this feature be disabled with a wireless router.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correct True
- False
- Question 29
- 0 out of 2 points
- Incorrect
- In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. IEEE
- b. W3C
- c. IETF
- d. ACM
- Question 30
- 0 out of 1 points
- Incorrect
- Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. tools
- b. applications
- Correctc. people
- d. systems
- Question 31
- 0 out of 2 points
- Incorrect
- Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. This is known as ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. spamming
- b. manipulating online polls
- c. spreading malware
- Correctd. denying services
- Question 32
- 0 out of 1 points
- Incorrect
- Financial cybercrime is often divided into two categories. The first category focuses on individuals and businesses.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correct True
- False
- Question 33
- 0 out of 2 points
- Incorrect
- Private key cryptography is also called ____ cryptography.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. peer-to-peer
- Correctb. symmetric
- c. protected
- d. asymmetric
- Question 34
- 0 out of 1 points
- Incorrect
- Passwords are still considered a strong defense against attackers.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- True
- Correct False
- Question 35
- 0 out of 1 points
- Incorrect
- A computer ____ is a person who has been hired to break into a computer and steal information.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. spy
- b. hacker
- c. worm
- d. mole
- Question 36
- 0 out of 1.5 points
- Incorrect
- The ____ of 2003 contains rules regarding consumer privacy.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Accurate Transactions Act
- b. Fair Credit Reporting Act
- Correctc. Fair and Accurate Credit Transactions Act
- d. Credit and Transactions Act
- Question 37
- 0 out of 1.5 points
- Incorrect
- Grouping individuals and organizations into clusters or groups based on their likes and interests is called ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. affiliate marketing
- b. social marketing
- Correctc. social networking
- d. affiliate networking
- Question 38
- 0 out of 1.5 points
- Incorrect
- Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. vishing
- b. whaling
- Correctc. pharming
- d. spear phishing
- Question 39
- 0 out of 1.5 points
- Incorrect
- Which of the following is NOT generally a good method to be successful in a Social Engineering attack?
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Flattery
- Correct
- Quickly getting the information from the victim
- Impersonating a person of authority
- Gaining the victim's trust
- Question 40
- 0 out of 2 points
- Incorrect
- There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. Bluetooth
- b. 4G LTE
- c. GSM
- d. 3G
- Question 41
- 0 out of 2 points
- Incorrect
- A ____ is a collection of suggestions that should be implemented.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. standard
- b. policy
- c. role book
- Correctd. guideline
- Question 42
- 0 out of 2 points
- Incorrect
- ____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Bluesnarfing
- Correctb. Bluejacking
- c. Bluephishing
- d. Bluesurfing
- Question 43
- 0 out of 1 points
- Incorrect
- In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. black-hat
- b. slacker
- c. white-hat
- Correctd. hacker
- Question 44
- 0 out of 1 points
- Incorrect
- There is a straightforward and easy solution to securing computers.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- True
- Correct False
- Question 45
- 0 out of 1 points
- Incorrect
- ____ are individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Hackers
- b. Elites
- c. Crackers
- Correctd. Script kiddies
- Question 46
- 0 out of 2 points
- Incorrect
- One of the best defenses against attacks is to create ____ on a regular basis.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. restore disks
- Correctb. data backups
- c. system documentation
- d. recovery disks
- Question 47
- 0 out of 1 points
- Incorrect
- Virtually anyone could type in a person’s username and pretend to be that person.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correct True
- False
- Question 48
- 0 out of 1.5 points
- Incorrect
- ____ may reveal the true level of security within the organization.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Phone directories
- b. System manuals
- Correctc. Policy manuals
- d. Organizational charts
- Question 49
- 0 out of 2 points
- Incorrect
- ____ is software that displays a fictitious warning to the user in the attempt to “scare” the user into an action, such as purchasing additional software online to fix a problem that in fact does not exist.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Adware
- b. Trojan
- c. Spyware
- Correctd. Scareware
- Question 50
- 0 out of 2 points
- Incorrect
- A(n) ____ account is designed for everyday computing activities and allows for some settings to be modified.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. guest
- b. system
- c. administrator
- Correctd. standard
- Question 51
- 0 out of 2 points
- Incorrect
- ____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Bluejacking
- Correctb. Bluesnarfing
- c. Bluesurfing
- d. Bluephising
- Question 52
- 0 out of 1.5 points
- Incorrect
- Data backups only protect data against computer attacks.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- True
- Correct False
- Question 53
- 0 out of 4 points
- Incorrect
- Match each term with the correct statement below.
- Question Correct Match Selected Match
- provides the optimum level of wireless security and has been mandatory for all certified wireless devices manufactured since March 2006.
- Correct g. WPA2
- [None Given]
- a traditional cellular telephone that includes a limited number of features.
- Correct d. Feature phone
- [None Given]
- used to send and receive wireless signals
- Correct e. Wireless adapter
- [None Given]
- short-range wireless technology designed for interconnecting computers and peripherals, handheld devices, and cell phones.
- Correct b. Bluetooth
- [None Given]
- searching for wireless signals from an automobile or on foot using a portable computing device.
- Correct c. War driving
- [None Given]
- a radical technology or innovation that fills a new role that an existing device or technology could not.
- Correct i. Disruptive technology
- [None Given]
- an AP or another computer that is set up by an attacker designed to mimic an authorized Wi-Fi device.
- Correct f. Evil twin
- [None Given]
- most widely used type of wireless network.
- Correct a. 802.11n
- [None Given]
- portable computing devices with screen sizes ranging from 5 to 10 inches (127 to 254 millimeters).
- Correct h. Tablet computers
- [None Given]
- All Answer Choices
- a. 802.11n
- b. Bluetooth
- c. War driving
- d. Feature phone
- e. Wireless adapter
- f. Evil twin
- g. WPA2
- h. Tablet computers
- i. Disruptive technology
- Question 54
- 0 out of 1 points
- Incorrect
- “____” involves breaking into a car’s electronic system.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Joyriding
- Correctb. Car hacking
- c. Car hijack
- d. Car riding
- Question 55
- 0 out of 1 points
- Incorrect
- The weakness of passwords centers on human memory.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correct True
- False
- Question 56
- 0 out of 1.5 points
- Incorrect
- To address the vulnerabilities in operating systems that are uncovered after the software has been released, software vendors usually deploy a software “fix” to address the vulnerabilities.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correct True
- False
- Question 57
- 0 out of 1 points
- Incorrect
- A recent vulnerability known as ______________ has effected a majority of web sites and the very foundation on which secuirty on the Internet is built by making SSL vulnerable to attack.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Flashback
- Correct
- Heartbleed
- Shell Shock
- Rocket Raccoon
- Question 58
- 0 out of 2 points
- Incorrect
- The ____ team is contacted whenever digital evidence needs to be preserved and serve as first responders.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. computer forensics response
- b. incident forensics response
- c. computer security incident response
- d. computer security
- Question 59
- 0 out of 1 points
- Incorrect
- ____ ensures that information is correct and no unauthorized person or malicious software has altered that data.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. Integrity
- b. Availability
- c. Protection
- d. Confidentiality
- Question 60
- 0 out of 1.5 points
- Incorrect
- ____ identify individuals within the organization who are in positions of authority.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Policy manuals
- b. System manuals
- Correctc. Organizational charts
- d. Phone directories
- Question 61
- 0 out of 1.5 points
- Incorrect
- Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide “cells” or areas of coverage.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correct True
- False
- Question 62
- 0 out of 1 points
- Incorrect
- A(n) ____ is a person or element that has the power to carry out a threat.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. threat agent
- b. risk
- c. attack agent
- d. vulnerability
- Question 63
- 0 out of 2 points
- Incorrect
- ____ are independently rotating large cups (in diameter of 5 inches or 115 millimeters) affixed to the top of a fence to prevent the hands of intruders from gripping the top of a fence to climb over it.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Anti-climb spikes
- Correctb. Roller barriers
- c. Rotating spikes
- d. Anti-climb collars
- Question 64
- 0 out of 1 points
- Incorrect
- In the last year, over 600,000 Apple Macs were infected with a malicious software called ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. Flashback
- b. Slapper
- c. Melissa
- d. Morris
- Question 65
- 0 out of 1.5 points
- Incorrect
- Bruce Shneier suggest which password generation method?
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Creating a 12 word seeded pass phrase
- Correct
- Combine a personally memorable sentence with some memorable tricks to modify that sentence into a password
- The Person-Object-Action method
- The Stem and Branch method
- Question 66
- 0 out of 1 points
- Incorrect
- Security ____ convenience.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. is proportional to
- Correctb. is inversely proportional to
- c. should be subservient to
- d. cannot coexist with
- Question 67
- 0 out of 1 points
- Incorrect
- Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. COPPA
- b. Sarbox
- Correctc. HIPAA
- d. GLBA
- Question 68
- 0 out of 1.5 points
- Incorrect
- ____ involves using someone’s personal information, such as a Social Security number, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Identity borrowing
- b. Information theft
- Correctc. Identity theft
- d. Property theft
- Question 69
- 0 out of 2 points
- Incorrect
- A security ____ is a general software security update intended to cover vulnerabilities that have been discovered since the program was released.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. repair
- b. control
- c. hole
- Correctd. patch
- Question 70
- 0 out of 2 points
- Incorrect
- Spyware usually performs one of the following functions on a user’s computer: ____, collecting personal information, or changing computer configurations.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. capturing screens
- b. deleting files
- c. keylogging
- Correctd. advertising
- Question 71
- 0 out of 1.5 points
- Incorrect
- Whereas tablets are designed for performance, laptops are focused on ease of use.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- True
- Correct False
- Question 72
- 0 out of 2 points
- Incorrect
- A ____ is created when hundreds, thousands, or even tens of thousands of zombie computers are manipulated under remote control.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. adnet
- b. wormnet
- Correctc. botnet
- d. malnet
- Question 73
- 0 out of 2 points
- Incorrect
- On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. auto-screen-off
- b. auto-sleep
- Correctc. auto-lock
- d. auto-password
- Question 74
- 0 out of 1 points
- Incorrect
- The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. network security
- b. information assurance
- Correctc. information security
- d. information warfare
- Question 75
- 0 out of 2 points
- Incorrect
- A(n) ____ infection injects portions of the code throughout the program’s executable code instead of only at the end of the file (any overwritten original code is transferred and stored inside the virus code for proper execution of the host program after the infection).
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. polymorphic
- b. appender
- Correctc. Swiss cheese
- d. replace
- Question 76
- 0 out of 2 points
- Incorrect
- One of the first software security applications is ____ software.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. host prevention
- Correctb. antivirus
- c. firewall
- d. antispyware
- Question 77
- 0 out of 2 points
- Incorrect
- A(n) ____ address is a unique hardware number that is “burned in” to each wireless network interface card adapter.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. WPS
- b. WPA2
- Correctc. MAC
- d. SSID
- Question 78
- 0 out of 3 points
- Incorrect
- Match each term with the correct statement below.
- Question Correct Match Selected Match
- Due to overwhelmed vendors trying to keep pace by updating their products against attacks
- Correct a. Delays in security updating
- [None Given]
- Potentially the next target for attackers.
- Correct i. Personal medical devices
- [None Given]
- Made possible by new software tools and techniques
- Correct d. Faster detection of vulnerabilities
- [None Given]
- Results in attackers that can launch attacks against millions of computers within minutes
- Correct h. Speed of attacks
- [None Given]
- Results in attack tools that can vary their behavior so the same attack appears differently each time
- Correct b. Greater sophistication of attacks
- [None Given]
- Results in attacks that are no longer limited to highly skilled attackers
- Correct f. Simplicity of attack tools
- [None Given]
- Allows attackers from anywhere in the world can send attacks
- Correct c. Universally connected devices
- [None Given]
- Happens when attackers use thousands of computers in an attack against a single computer or network
- Correct e. Distributed attacks
- [None Given]
- Happens when users are required to make difficult security decisions with little or no instruction
- Correct g. User confusion
- [None Given]
- All Answer Choices
- a. Delays in security updating
- b. Greater sophistication of attacks
- c. Universally connected devices
- d. Faster detection of vulnerabilities
- e. Distributed attacks
- f. Simplicity of attack tools
- g. User confusion
- h. Speed of attacks
- i. Personal medical devices
- Question 79
- 0 out of 1.5 points
- Incorrect
- A ____ attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. man in the middle
- Correctb. dictionary
- c. hash
- d. brute force
- Question 80
- 0 out of 1 points
- Incorrect
- ____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. HIPAA
- b. Sarbox
- Correctc. GLBA
- d. COPPA
- Question 81
- 0 out of 1 points
- Incorrect
- ____ ensures that data is accessible when needed to authorized users.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Integrity
- b. Non-repudiation
- Correctc. Availability
- d. Confidentiality
- Question 82
- 0 out of 2 points
- Incorrect
- A ____ is essentially a duplicate of the organization’s main production site and has all the equipment needed for it to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. cold site
- b. warm site
- c. neutral site
- Correctd. hot site
- Question 83
- 0 out of 1 points
- Incorrect
- ____ involves stealing another person’s personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. Identity theft
- b. Digital fraud
- c. White hat hacking
- d. Cyberterrorism
- Question 84
- 0 out of 2 points
- Incorrect
- A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. free access network
- Correctb. virtual private network
- c. secure access network
- d. ad hoc network
- Question 85
- 0 out of 1 points
- Incorrect
- From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. 456,000
- b. 22 million
- Correctc. 562 million
- d. 660 billion
- Question 86
- 0 out of 2 points
- Incorrect
- An infected ‘‘robot’’ computer is known as a ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. bottle
- b. Trojan horse
- Correctc. zombie
- d. beachhead
- Question 87
- 0 out of 2 points
- Incorrect
- Most passwords are composed of two sections known as _____ and _______. (Select two)
- Selected Answers:
- Incorrect [None Given]
- Answers:
- Correct
- root
- non-ascii characters
- Correct
- appendage
- transformers
- Question 88
- 0 out of 1 points
- Incorrect
- A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. vulnerability
- b. threat
- c. threat agent
- d. asset
- Question 89
- 0 out of 1.5 points
- Incorrect
- Which of the following is generally NOT a method of password cracking?
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Dictionary Attacks
- Correct
- Online Brute Force
- Offline Brute Force
- Online Dictionary Cycling
- Question 90
- 0 out of 1.5 points
- Incorrect
- Social engineering ____ means to create a fictitious character and then play out the role of that person on a victim.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. common roles
- b. identity theft
- Correctc. impersonation
- d. conformity
- Question 91
- 0 out of 1.5 points
- Incorrect
- Whereas phishing involves sending millions of generic e-mail messages to users, ____ targets only specific users.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. spear phishing
- b. pharming
- c. vishing
- d. whaling
- Question 92
- 0 out of 1 points
- Incorrect
- The FBI defines ____ as any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. cyberware
- Correctb. cyberterrorism
- c. information warfare
- d. eTerrorism
- Question 93
- 0 out of 1 points
- Incorrect
- Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. hacktivists
- Correctb. cyberterrorists
- c. spies
- d. hackers
- Question 94
- 0 out of 2 points
- Incorrect
- ____ is defined as the ability of an organization to maintain its operations and services in the face of a disruptive event.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Disaster planning
- b. Business recovery
- Correctc. Business continuity
- d. Disaster recovery
- Question 95
- 0 out of 2 points
- Incorrect
- A(n) ____ contains an integrated circuit chip, which can hold information, which can then be used as part of the authentication process.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. OTP
- b. multifactor token
- c. smart PIN
- Correctd. smart card
- Question 96
- 0 out of 2 points
- Incorrect
- ____ policy creates standards for using corporate e-mail.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Information sensitivity
- b. E-mail retention
- c. Automatically forwarded e-mail
- Correctd. E-mail
- Question 97
- 0 out of 2 points
- Incorrect
- A computer ____ is a program advertised as performing one activity but actually does something else.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. rootkit
- b. worm
- c. virus
- Correctd. Trojan
- Question 98
- 0 out of 2 points
- Incorrect
- ____ is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Roller barrier
- b. Rotating paint
- c. Anti-climb collar
- Correctd. Anti-climb paint
- Question 99
- 0 out of 1 points
- Incorrect
- A(n) ____ is a type of action that has the potential to cause harm.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. vulnerability
- Correctb. threat
- c. threat agent
- d. asset
- Question 100
- 0 out of 1 points
- Incorrect
- In a well-run information security program, attacks will never get through security perimeters and local defenses.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- True
- Correct False
- Question 101
- 0 out of 2 points
- Incorrect
- The two types of malware that have the primary objective of infecting a computer system are ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. worms and spyware
- b. Trojans and adware
- c. viruses and Trojans
- Correctd. viruses and worms
- Question 102
- 0 out of 1.5 points
- Incorrect
- Most viruses can spread to other computers by themselves.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- True
- Correct False
- Question 103
- 0 out of 1.5 points
- Incorrect
- A ____ is a program that lets a user create and store multiple strong passwords in a single user database file that is protected by one strong master password.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. password fault program
- b. password vault program
- Correctc. password management application
- d. password generation program
- Question 104
- 0 out of 2 points
- Incorrect
- A botnet consisting of thousands of zombies enables an attacker to send massive amounts of spam. Some botnets can also harvest e-mail addresses. This is known as ____.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. spamming
- b. spreading malware
- c. denying services
- d. manipulating online polls
- Question 105
- 0 out of 2 points
- Incorrect
- A(n) ____ is a written document that states how an organization plans to protect the company’s information technology assets.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. network policy
- b. asset policy
- Correctc. security policy
- d. information policy
- Question 106
- 0 out of 2 points
- Incorrect
- ____ is the application of science to questions that are of interest to the legal profession.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Applied science
- b. Criminal science
- Correctc. Forensics
- d. Legal science
- Question 107
- 0 out of 1 points
- Incorrect
- An attacker must be highly skilled in technical knowledge and abilities in order to be successful in a Social Engineering attack.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- True
- Correct False
- Question 108
- 0 out of 2 points
- Incorrect
- The ____ in a Wi-Fi network serves as the network name identifier.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. SSID
- b. WPS Pin number
- c. MAC address
- d. WPA2 ID
- Question 109
- 0 out of 2 points
- Incorrect
- A ____ self-replicates between computers (from one computer to another).
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. rootkit
- b. Trojan
- c. virus
- Correctd. worm
- Question 110
- 0 out of 1 points
- Incorrect
- You should always be truthful when answering "secret questions" so that you have a way to reset your passwords should you forget them.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- True
- Correct False
- Question 111
- 0 out of 1.5 points
- Incorrect
- Which of the following is NOT a valid method of authentication?
- Selected Answer:
- Incorrect [None Given]
- Answers:
- What you have
- What you know
- Correct
- What you think
- What you are
- Question 112
- 0 out of 2 points
- Incorrect
- A ____ silently captures and stores each keystroke that a user types on the computer’s keyboard.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- Correcta. keylogger
- b. backdoor
- c. rootkit
- d. worm
- Question 113
- 0 out of 2 points
- Incorrect
- AV software on a computer must have its ____ files regularly updated by downloads from the Internet.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. control
- b. program
- c. behavior
- Correctd. signature
- Question 114
- 0 out of 3 points
- Incorrect
- Match each term with the correct statement below.
- Question Correct Match Selected Match
- use of a telephone call instead of e-mail to contact a potential victim
- Correct h. Vishing
- [None Given]
- one type of spear phishing
- Correct e. Whaling
- [None Given]
- information entered is observed by another person
- Correct c. Shoulder surfing
- [None Given]
- any secret combination of letters, numbers, and/or symbols that serves to validate or authenticate a user by what she knows
- Correct d. Password
- [None Given]
- trying to guess a password through combining a systematic combination of characters
- Correct a. Brute force attack
- [None Given]
- means of gathering information for an attack by relying on the weaknesses of individuals
- Correct g. Social engineering
- [None Given]
- WUuAxB2aWBndTf7MfEtm is an example of this
- Correct i. Strong passwords
- [None Given]
- process that confirms a user’s identity
- Correct f. Authentication
- [None Given]
- once an authorized person opens the door then virtually any number of individuals can follow behind and also enter the building or area
- Correct b. Tailgating
- [None Given]
- All Answer Choices
- a. Brute force attack
- b. Tailgating
- c. Shoulder surfing
- d. Password
- e. Whaling
- f. Authentication
- g. Social engineering
- h. Vishing
- i. Strong passwords
- Question 115
- 0 out of 5 points
- Incorrect
- Match each term with the correct statement below.
- Question Correct Match Selected Match
- involves building excess capacity in order to protect against failures
- Correct e.
- Redundancy planning
- [None Given]
- designed to separate a nonsecure area from a secure area
- Correct c.
- Mantrap
- [None Given]
- maintains power to equipment in the event of an interruption in the primary electrical power source.
- Correct h.
- Uninterruptible power supply
- [None Given]
- provides office space but the customer must provide and install all the equipment needed to continue operations
- Correct d.
- Cold site
- [None Given]
- has all of the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data
- Correct g.
- Warm site
- [None Given]
- lock the door but have access to unlock from the outside via a small hole.
- Correct a.
- Privacy locks
- [None Given]
- combination locks that use buttons that must be pushed in the proper sequence to open the door.
- Correct i.
- Cipher locks
- [None Given]
- performs continuous data backups that can be restored immediately
- Correct f.
- CDP
- [None Given]
- latch a door closed yet do not lock it; typically used on hall and closet doors
- Correct b.
- Passage locks
- [None Given]
- All Answer Choices
- a.
- Privacy locks
- b.
- Passage locks
- c.
- Mantrap
- d.
- Cold site
- e.
- Redundancy planning
- f.
- CDP
- g.
- Warm site
- h.
- Uninterruptible power supply
- i.
- Cipher locks
- Question 116
- 0 out of 1.5 points
- Incorrect
- If a consumer finds a problem on her credit report, she must first send a letter to the credit-reporting agency. Under federal law, the agency has ____ days to investigate and respond to the alleged inaccuracy and issue a corrected report.
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. 15
- Correctb. 30
- c. 45
- d. 60
- Question 117
- 0 out of 2 points
- Incorrect
- ____ policy is a Microsoft Windows feature that provides centralized management and configuration of computers and remote users using the Microsoft directory service Active Directory (AD).
- Selected Answer:
- Incorrect [None Given]
- Answers:
- a. Network security
- b. Server security
- Correctc. Group
- d. Acceptable use
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement