Exam 18: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

List one benefit of an electronic key card.

Free
(Essay)
4.8/5
(31)
Correct Answer:
Verified

Answers will vary, but sample answers follow: Easy to program and issue/revoke, data is stored in a database, access information is logged and monitored, more layers of control can be issued, replacement of lost key is easier, better security than a physical key.

In one or more sentences, describe the difference between an IDS and IPS using good grammar, capitalization, and punctuation.

Free
(Essay)
4.8/5
(39)
Correct Answer:
Verified

An IDS is a passive system that monitors network traffic for suspect traffic.In contrast, an IPS is an active system that does the same except that it can take action such as send an alarm, log an event, reset connections, block traffic, drop packets, or disable ports.

Which of the following would help with shoulder surfing? [ mantrap | password security | tracking module | privacy filter ]

Free
(Short Answer)
4.8/5
(25)
Correct Answer:
Verified

Privacy filter

Which security technology would be used to protect an organization against an external digital threat? [ mantrap | TPM | firewall | computer cage ]

(Short Answer)
4.8/5
(35)

In what instance would an AUP be relevant?

(Multiple Choice)
4.8/5
(44)

Which security technology would be used to have secure data communication with a corporate network across the Internet? [ TPM | VPN | DLP | email filtering ]

(Short Answer)
4.8/5
(38)

Which security measure might help locate a lost mobile device? [ mantrap | tracking module | TPM | computer cage ]

(Short Answer)
4.8/5
(38)

What is the practice of an unauthorized person entering a space behind an authorized person called? [ tailgating | phishing | spear phishing | tracking ]

(Short Answer)
4.9/5
(41)

What is used to gain administrator access to a Linux operating system? [ Trojan virus | botnet | spyware | rootkit ]

(Short Answer)
4.9/5
(36)

Someone buys a cheap game at a store and then gives the same game to the neighbor to install.Which term describes this act? [ shoulder surfing | piracy | malware | ransomware ]

(Short Answer)
5.0/5
(41)

Which security technology would help with spam? [ multifactor authentication | VPN | firewall | email filtering ]

(Short Answer)
4.8/5
(25)

Which of the following would help with tailgating? [ mantrap | password security | TPM | computer cage ]

(Short Answer)
4.8/5
(39)

Where would the number and type of characters required for a corporate password be documented?

(Multiple Choice)
4.9/5
(40)

Which two of the following should be required if a company has an outside company that destroys sensitive corporate documents? (Choose two.) [ tracking module | certificate of destruction | privacy filter | AUP | proof of incineration | multifactor authentication ]

(Short Answer)
4.8/5
(38)

Which security threat does not allow user access to a device until the user pays money? [ Trojan | piracy | malware | ransomware ]

(Short Answer)
4.8/5
(30)

Which type of license would be used for Microsoft Office licensed to all desktops in a college? [ open source | personal | licensed | commercial ]

(Short Answer)
4.9/5
(33)

List one way in which a biometric device might be used in computer and/or network security.

(Essay)
4.8/5
(33)

Which of the following would be considered PII? (Choose all that apply.) [ employee ID | unique password | someone's age | person's name | corporate user ID ]

(Short Answer)
4.7/5
(31)

What does LoJack do?

(Multiple Choice)
4.8/5
(29)

Which security threat poses as a legitimate source because it contains personal information that is legitimate? [ Trojan virus | rootkit | botnet | spear phishing ]

(Short Answer)
4.8/5
(35)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)