Deck 9: Security

Full screen (f)
exit full mode
Question
Which of the following firewall ports must be open to allow FTP traffic?

A)Port 20 and 22
B)Port 25 and 110
C)Port 20 and 21
D)Port 80 and 443
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following attacks can be prevented if you shred all confidential material before dumping it in the waste bins?

A)Man-in-the-middle
B)Shoulder surfing
C)Phishing
D)Dumpster diving
Question
When should passwords be allowed to be sent as plain text over a public network?

A)Never
B)When the password protected resources are fairly unimportant
C)When using Secure Shell
D)When the communications are secured by SSL or TLS
Question
Jack walks back to his desk and tries to log on to his computer. He receives a message that states he needs to contact his administrator because his account is locked. What could have been the probable cause?

A)An intruder has tried logging on to his system. On successive failed attempts, the account lockout policy has locked his PC.
B)The entire network is down.
C)He has left some application open on his computer, which has locked the system.
D)He needs to continue to try logging on. Eventually the system will allow him to log in.
Question
Harriet has just switched on her system and opened a Word document. Unprompted, her computer suddenly connects to the Internet. What kind of attack is this a symptom of?

A)An ACK attack
B)A worm
C)A logic bomb
D)A virus
Question
Harriet the IT Administrator is getting frequent complaints from users that they are receiving unsolicited e-mails from an e-mail address. What should she do to prevent this from occurring?

A)Install an anti-spam filter on the domain mail servers and filter the email address.
B)Configure Outlook to block these e-mails.
C)Configure a rule in each user's router and restart the router.
D)Configure the firewall to block the e-mails.
Question
David is the Security Advisor at his organization. He is predicting a rapid growth in the number of systems connecting to the corporate network. He wants to hide segments of the network from other segments and thereby control access to data on the network. Which of the following should he implement?

A)A security zone
B)NAT
C)MAC
D)VLAN
Question
Your boss asks you to send a memo to the company on recommended password practices for company computers. Besides recommending the best types of passwords, you want to describe which practices to avoid when creating a password. Which of the following practices do you recommend against? Choose two.

A)Using the same password for every login.
B)Incorporating symbols into passwords.
C)Using different passwords for different logins.
D)Not being able to remember all of the passwords.
Question
Of the following biometric methods, which is the least reliable for security purposes?

A)Retina scan
B)Voice analysis
C)Fingerprint scan
D)Hand analysis (geometry scan)
Question
Which of the following should Mary set up on her Wi-Fi router to make it as secure as possible?

A)NTFS
B)WPA
C)DHCP
D)WPA2
Question
An intern with your IT department needs to know more about wireless security. Of the following, which are valid wireless encryption types?

A)SSID
B)WPA
C)WEP
D)SSL
Question
Jill is trying to install an antivirus on her computer. Despite repeated attempts she is not able to install the antivirus software. What could be the most likely problem?

A)It is an old version of the antivirus software.
B)She has just re-installed the operating system.
C)She has Microsoft office running on the computer.
D)She is logged in as a guest.
Question
A confirmed user in your Active Directory network calls and has forgotten his password. He asks you for the password. To ensure a basic security standard and a prompt resolution, you:

A)Locate the password and tell him the password.
B)Reset the password on his computer to a temporary password, advise him of the temporary password and to change this (the password) to a permanent password once he logs in.
C)Set an appointment to manually change the password at his computer.
D)Tell him to speak to his supervisor, who needs to request the password.
Question
Which of these tools should be used to enable auditing on a local level?

A)Local Security Settings
B)AD policy
C)Group Policy
D)User Settings
Question
Your IT Director is concerned about the data stored on retired computers. You have been tasked to recommend a security procedure that prevents the data (on the hard drive) from being recovered. What is the best procedure?

A)Recycle the hard drives.
B)Flash the BIOS.
C)Destroy the hard drives.
D)Format each drive.
Question
New laptops with Windows 7 have just arrived. These are intended to be used outside the company for business trips. To ensure the security of data, you utilize which option?

A)Windows Firewall
B)Bit Locker
C)Trusted Platform Module
Question
A specific program that uses a UDP protocol and has an assigned port number needs to pass through your firewall on a Windows 7 computer. How do you allow grant secure access?

A)Create a program to allow this access
B)Create an exception
C)Use the Add Port button
Question
Generally, one should not open any attachments sent from unknown senders through email. Which of the following attachments poses a maximum security risk if opened?

A)DOC
B)SCR
C)PDF
D)XLS
Question
An employee has just received a new laptop. She asks which threats the antivirus software typically prevents. Which of the following threats are commonly prevented?

A)Worms
B)Spam
C)Trojans
D)Viruses
Question
Which of the following can significantly increase the risk of unauthorized access on a wireless network?
I. Using WEP authentication.
II. Using low time intervals between successive beacons.
III. Using generic SSIDs.

A)I and II
B)I and III
C)II and III
D)All of the above
Question
What is the generic term for a hacker going through your trash to find critical information?

A)Dumpster diving.
B)Refuse searching.
C)Refuse diving.
D)Dumpster searching.
Question
Which of the following types of program is not destructive, but leach bandwidth in networks and can turn a speedy machine into a slow one?

A)Malware
B)Adware
C)Spyware
D)Grayware
Question
John is concerned about users using thumb drives to connect to USB ports on company workstations because this could facilitate data theft of sensitive files. What should he do to fix this concern?

A)Disable USB in the workstation BIOS.
B)Seal all USB ports.
C)Install Antivirus.
D)Install Firewall.
Question
The only way to ensure that a hard disk is completely wiped so data cannot be retrieved from it, is:

A)Degaussing
B)Shredding
C)Drilling
D)Drive Wiping
Question
Which of the following characterizes malware that enables privileged access to the operating system and therefore is able to conceal itself from normal detection methods?

A)Trojans
B)Rootkits
C)Worms
D)Spyware
Question
Which of the following would help prevent threats from CDs or DVDs?

A)Restricting user permissions.
B)Setting strong passwords.
C)Changing default user names.
D)Disabling autorun.
Question
What type of malware encrypts data and holds data hostage for a fee to decrypt it?

A)Ransomware
B)Viruses
C)Trojans
D)Rootkits
Question
What type of attack is used to phish data from specific employees such as executives?

A)Spear phishing
B)Spoofing
C)Shoulder surfing
D)Zero day
Question
What can be used on a Windows system to fully encrypt the hard drive?

A)IIS
B)FTP
C)BitLocker
D)PGP
Question
What is common on Android phones to unlock the device?

A)Fingerprint lock
B)Face lock
C)Swipe lock
D)Biometric lock
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Security
1
Which of the following firewall ports must be open to allow FTP traffic?

A)Port 20 and 22
B)Port 25 and 110
C)Port 20 and 21
D)Port 80 and 443
Port 20 and 21
2
Which of the following attacks can be prevented if you shred all confidential material before dumping it in the waste bins?

A)Man-in-the-middle
B)Shoulder surfing
C)Phishing
D)Dumpster diving
Dumpster diving
3
When should passwords be allowed to be sent as plain text over a public network?

A)Never
B)When the password protected resources are fairly unimportant
C)When using Secure Shell
D)When the communications are secured by SSL or TLS
Never
4
Jack walks back to his desk and tries to log on to his computer. He receives a message that states he needs to contact his administrator because his account is locked. What could have been the probable cause?

A)An intruder has tried logging on to his system. On successive failed attempts, the account lockout policy has locked his PC.
B)The entire network is down.
C)He has left some application open on his computer, which has locked the system.
D)He needs to continue to try logging on. Eventually the system will allow him to log in.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Harriet has just switched on her system and opened a Word document. Unprompted, her computer suddenly connects to the Internet. What kind of attack is this a symptom of?

A)An ACK attack
B)A worm
C)A logic bomb
D)A virus
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
Harriet the IT Administrator is getting frequent complaints from users that they are receiving unsolicited e-mails from an e-mail address. What should she do to prevent this from occurring?

A)Install an anti-spam filter on the domain mail servers and filter the email address.
B)Configure Outlook to block these e-mails.
C)Configure a rule in each user's router and restart the router.
D)Configure the firewall to block the e-mails.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
David is the Security Advisor at his organization. He is predicting a rapid growth in the number of systems connecting to the corporate network. He wants to hide segments of the network from other segments and thereby control access to data on the network. Which of the following should he implement?

A)A security zone
B)NAT
C)MAC
D)VLAN
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
Your boss asks you to send a memo to the company on recommended password practices for company computers. Besides recommending the best types of passwords, you want to describe which practices to avoid when creating a password. Which of the following practices do you recommend against? Choose two.

A)Using the same password for every login.
B)Incorporating symbols into passwords.
C)Using different passwords for different logins.
D)Not being able to remember all of the passwords.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
Of the following biometric methods, which is the least reliable for security purposes?

A)Retina scan
B)Voice analysis
C)Fingerprint scan
D)Hand analysis (geometry scan)
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following should Mary set up on her Wi-Fi router to make it as secure as possible?

A)NTFS
B)WPA
C)DHCP
D)WPA2
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
An intern with your IT department needs to know more about wireless security. Of the following, which are valid wireless encryption types?

A)SSID
B)WPA
C)WEP
D)SSL
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
Jill is trying to install an antivirus on her computer. Despite repeated attempts she is not able to install the antivirus software. What could be the most likely problem?

A)It is an old version of the antivirus software.
B)She has just re-installed the operating system.
C)She has Microsoft office running on the computer.
D)She is logged in as a guest.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
A confirmed user in your Active Directory network calls and has forgotten his password. He asks you for the password. To ensure a basic security standard and a prompt resolution, you:

A)Locate the password and tell him the password.
B)Reset the password on his computer to a temporary password, advise him of the temporary password and to change this (the password) to a permanent password once he logs in.
C)Set an appointment to manually change the password at his computer.
D)Tell him to speak to his supervisor, who needs to request the password.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Which of these tools should be used to enable auditing on a local level?

A)Local Security Settings
B)AD policy
C)Group Policy
D)User Settings
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
Your IT Director is concerned about the data stored on retired computers. You have been tasked to recommend a security procedure that prevents the data (on the hard drive) from being recovered. What is the best procedure?

A)Recycle the hard drives.
B)Flash the BIOS.
C)Destroy the hard drives.
D)Format each drive.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
New laptops with Windows 7 have just arrived. These are intended to be used outside the company for business trips. To ensure the security of data, you utilize which option?

A)Windows Firewall
B)Bit Locker
C)Trusted Platform Module
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
A specific program that uses a UDP protocol and has an assigned port number needs to pass through your firewall on a Windows 7 computer. How do you allow grant secure access?

A)Create a program to allow this access
B)Create an exception
C)Use the Add Port button
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
Generally, one should not open any attachments sent from unknown senders through email. Which of the following attachments poses a maximum security risk if opened?

A)DOC
B)SCR
C)PDF
D)XLS
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
An employee has just received a new laptop. She asks which threats the antivirus software typically prevents. Which of the following threats are commonly prevented?

A)Worms
B)Spam
C)Trojans
D)Viruses
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following can significantly increase the risk of unauthorized access on a wireless network?
I. Using WEP authentication.
II. Using low time intervals between successive beacons.
III. Using generic SSIDs.

A)I and II
B)I and III
C)II and III
D)All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
What is the generic term for a hacker going through your trash to find critical information?

A)Dumpster diving.
B)Refuse searching.
C)Refuse diving.
D)Dumpster searching.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following types of program is not destructive, but leach bandwidth in networks and can turn a speedy machine into a slow one?

A)Malware
B)Adware
C)Spyware
D)Grayware
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
John is concerned about users using thumb drives to connect to USB ports on company workstations because this could facilitate data theft of sensitive files. What should he do to fix this concern?

A)Disable USB in the workstation BIOS.
B)Seal all USB ports.
C)Install Antivirus.
D)Install Firewall.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
The only way to ensure that a hard disk is completely wiped so data cannot be retrieved from it, is:

A)Degaussing
B)Shredding
C)Drilling
D)Drive Wiping
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following characterizes malware that enables privileged access to the operating system and therefore is able to conceal itself from normal detection methods?

A)Trojans
B)Rootkits
C)Worms
D)Spyware
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following would help prevent threats from CDs or DVDs?

A)Restricting user permissions.
B)Setting strong passwords.
C)Changing default user names.
D)Disabling autorun.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
What type of malware encrypts data and holds data hostage for a fee to decrypt it?

A)Ransomware
B)Viruses
C)Trojans
D)Rootkits
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
What type of attack is used to phish data from specific employees such as executives?

A)Spear phishing
B)Spoofing
C)Shoulder surfing
D)Zero day
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
What can be used on a Windows system to fully encrypt the hard drive?

A)IIS
B)FTP
C)BitLocker
D)PGP
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
What is common on Android phones to unlock the device?

A)Fingerprint lock
B)Face lock
C)Swipe lock
D)Biometric lock
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 30 flashcards in this deck.