Deck 19: Security Essentials
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 19: Security Essentials
1
A ____ is made of several words with spaces allowed.
A)password
B)passphrase
C)token
D)credential
A)password
B)passphrase
C)token
D)credential
B
2
A Trojan sometimes installs a ____ in the system,which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
A)backdoor
B)release
C)helper
D)beneficial routine
A)backdoor
B)release
C)helper
D)beneficial routine
A
3
When implementing a security plan,the four steps are sometimes called the ____.
A)Plan-Build-Run-Act
B)Plan-Build-Review-Act
C)Plan-Do-Study-Act
D)Plan-Study-Act-Review
A)Plan-Build-Run-Act
B)Plan-Build-Review-Act
C)Plan-Do-Study-Act
D)Plan-Study-Act-Review
C
4
Individuals are always free to decide what security measures they want to use.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A(n)____ account has complete access to the system and can make changes that affect the security of the system and other users.
A)service
B)administrator
C)privileged
D)user
A)service
B)administrator
C)privileged
D)user
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ virus can hide in either of two boot areas of a hard drive.
A)partition
B)Trojan
C)polymorphic
D)boot sector
A)partition
B)Trojan
C)polymorphic
D)boot sector
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Internet Explorer includes the pop-up blocker,the ability to manage add-ons,the ability to block scripts and disable scripts embedded in Web pages,and the ability to set the general security level.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The International Organization for Standardization has developed two documents (____),which describe,in detail,the recommended standards to secure computer resources.
A)BS 7799 and ISO 17799
B)ISO 17799 and ISO 27002
C)ISO 17799 and ISO 27001
D)ISO 27001 and ISO 7799
A)BS 7799 and ISO 17799
B)ISO 17799 and ISO 27002
C)ISO 17799 and ISO 27001
D)ISO 27001 and ISO 7799
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
____ is any annoying and unwanted program that might or might not mean you harm.
A)Malware
B)Grayware
C)Testware
D)Adware
A)Malware
B)Grayware
C)Testware
D)Adware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Don't use the same password on more than one system (computer,network,or application).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
A)access
B)interface
C)drive
D)control
A)access
B)interface
C)drive
D)control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
For the health care industry,the ____ includes regulations to secure patient data that apply to all health care companies and professionals.
A)GLB
B)NIST
C)SOX
D)HIPAA
A)GLB
B)NIST
C)SOX
D)HIPAA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
When you are responsible for the security of a computer or small network,make it a habit to check every computer for which you are responsible every day.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Most encryption software products use a method called ____.
A)Private Key Encryption
B)Symmetric Key Encryption
C)Shared Secret Encryption
D)Public Key Encryption
A)Private Key Encryption
B)Symmetric Key Encryption
C)Shared Secret Encryption
D)Public Key Encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
A ____ is assigned by a Certification Authority,and is used to prove you are who you say you are.
A)password
B)token
C)digital certificate
D)credential
A)password
B)token
C)digital certificate
D)credential
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
A)weak
B)usable
C)unbreakable
D)strong
A)weak
B)usable
C)unbreakable
D)strong
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
A)permissions
B)controls
C)authentication
D)sensitivity
A)permissions
B)controls
C)authentication
D)sensitivity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Because of the problem of losing encrypted data and Internet passwords when a user password is reset,each new user should create a password ____ disk for use in the event the user forgets the password.
A)reset
B)recovery
C)vault
D)conversion
A)reset
B)recovery
C)vault
D)conversion
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
A(n)____ account has read-write access only on its own folders,read-only access to most system folders,and no access to other users' data.
A)user
B)administrator
C)limited
D)privileged
A)user
B)administrator
C)limited
D)privileged
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
It's best to use three-factor authentication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive.
A)partition utility
B)diagnostic utility
C)cloning utility
D)zero-fill utility
A)partition utility
B)diagnostic utility
C)cloning utility
D)zero-fill utility
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
A(n)____________________ virus is a virus that hides in a script,which might execute when you click a link on a Web page or in an HTML e-mail message or when you attempt to open an e-mail attachment.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Substitutes itself for a legitimate program
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Substitutes itself for a legitimate program
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Junk e-mail that you don't want,you didn't ask for,and that gets in your way
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Junk e-mail that you don't want,you didn't ask for,and that gets in your way
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Proves that an individual is who he says he is and is accomplished by a variety of techniques
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Proves that an individual is who he says he is and is accomplished by a variety of techniques
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Dormant code added to software and triggered at a predetermined time or by a predetermined event
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Dormant code added to software and triggered at a predetermined time or by a predetermined event
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Malware that loads itself before the OS boot is complete
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Malware that loads itself before the OS boot is complete
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
The most common viruses spread by e-mail
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
The most common viruses spread by e-mail
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Hides in an executable program having an .exe,.com,.sys,.vbs,or other executable file extension,or in a word-processing document that contains a macro
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Hides in an executable program having an .exe,.com,.sys,.vbs,or other executable file extension,or in a word-processing document that contains a macro
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Generally speaking,the weakest link in setting up security in a computer environment is ____.
A)the network
B)the operating system
C)people
D)the hardware
A)the network
B)the operating system
C)people
D)the hardware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
____________________ is the default authentication protocol used by Windows Vista/XP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
A(n)____________________ is a program that replicates by attaching itself to other programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
As part of the authentication process,rather than proving a person is in possession of a token,some systems are set to use ____________________ data to validate the person's physical body.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Determines what an individual can do in the system
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Determines what an individual can do in the system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
As a part of managing the security of a computer or network,your organization might make you accountable to fill out a(n)____________________ report of unusual or atypical events.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
As a defensive and offensive measure to protect against malicious software,install and run ____ software and keep it current.
A)virus
B)antivirus
C)spyware
D)Trojan
A)virus
B)antivirus
C)spyware
D)Trojan
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
In the computer arena,____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
A)social engineering
B)social hacking
C)hacktivism
D)social motivation
A)social engineering
B)social hacking
C)hacktivism
D)social motivation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
A)polymorphic
B)boot sector
C)multipartite
D)macro
A)polymorphic
B)boot sector
C)multipartite
D)macro
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
A)multipartite
B)macro
C)polymorphic
D)boot sector
A)multipartite
B)macro
C)polymorphic
D)boot sector
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe what adware is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
List and describe four rules that can help you use the Internet responsibility.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe Smart Cards.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss what is involved in the Study step of the PDSA cycle.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Discuss what is involved in the Plan step of the PDSA cycle.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Explain the purpose of authorization.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain the purpose of authentication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List five criteria for a strong password.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Explain a drive lock password.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
List three ways to lock down your workstation each time you step away from your desk.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck