Deck 9: Security

ملء الشاشة (f)
exit full mode
سؤال
Which of the following firewall ports must be open to allow FTP traffic?

A)Port 20 and 22
B)Port 25 and 110
C)Port 20 and 21
D)Port 80 and 443
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following attacks can be prevented if you shred all confidential material before dumping it in the waste bins?

A)Man-in-the-middle
B)Shoulder surfing
C)Phishing
D)Dumpster diving
سؤال
When should passwords be allowed to be sent as plain text over a public network?

A)Never
B)When the password protected resources are fairly unimportant
C)When using Secure Shell
D)When the communications are secured by SSL or TLS
سؤال
Jack walks back to his desk and tries to log on to his computer. He receives a message that states he needs to contact his administrator because his account is locked. What could have been the probable cause?

A)An intruder has tried logging on to his system. On successive failed attempts, the account lockout policy has locked his PC.
B)The entire network is down.
C)He has left some application open on his computer, which has locked the system.
D)He needs to continue to try logging on. Eventually the system will allow him to log in.
سؤال
Harriet has just switched on her system and opened a Word document. Unprompted, her computer suddenly connects to the Internet. What kind of attack is this a symptom of?

A)An ACK attack
B)A worm
C)A logic bomb
D)A virus
سؤال
Harriet the IT Administrator is getting frequent complaints from users that they are receiving unsolicited e-mails from an e-mail address. What should she do to prevent this from occurring?

A)Install an anti-spam filter on the domain mail servers and filter the email address.
B)Configure Outlook to block these e-mails.
C)Configure a rule in each user's router and restart the router.
D)Configure the firewall to block the e-mails.
سؤال
David is the Security Advisor at his organization. He is predicting a rapid growth in the number of systems connecting to the corporate network. He wants to hide segments of the network from other segments and thereby control access to data on the network. Which of the following should he implement?

A)A security zone
B)NAT
C)MAC
D)VLAN
سؤال
Your boss asks you to send a memo to the company on recommended password practices for company computers. Besides recommending the best types of passwords, you want to describe which practices to avoid when creating a password. Which of the following practices do you recommend against? Choose two.

A)Using the same password for every login.
B)Incorporating symbols into passwords.
C)Using different passwords for different logins.
D)Not being able to remember all of the passwords.
سؤال
Of the following biometric methods, which is the least reliable for security purposes?

A)Retina scan
B)Voice analysis
C)Fingerprint scan
D)Hand analysis (geometry scan)
سؤال
Which of the following should Mary set up on her Wi-Fi router to make it as secure as possible?

A)NTFS
B)WPA
C)DHCP
D)WPA2
سؤال
An intern with your IT department needs to know more about wireless security. Of the following, which are valid wireless encryption types?

A)SSID
B)WPA
C)WEP
D)SSL
سؤال
Jill is trying to install an antivirus on her computer. Despite repeated attempts she is not able to install the antivirus software. What could be the most likely problem?

A)It is an old version of the antivirus software.
B)She has just re-installed the operating system.
C)She has Microsoft office running on the computer.
D)She is logged in as a guest.
سؤال
A confirmed user in your Active Directory network calls and has forgotten his password. He asks you for the password. To ensure a basic security standard and a prompt resolution, you:

A)Locate the password and tell him the password.
B)Reset the password on his computer to a temporary password, advise him of the temporary password and to change this (the password) to a permanent password once he logs in.
C)Set an appointment to manually change the password at his computer.
D)Tell him to speak to his supervisor, who needs to request the password.
سؤال
Which of these tools should be used to enable auditing on a local level?

A)Local Security Settings
B)AD policy
C)Group Policy
D)User Settings
سؤال
Your IT Director is concerned about the data stored on retired computers. You have been tasked to recommend a security procedure that prevents the data (on the hard drive) from being recovered. What is the best procedure?

A)Recycle the hard drives.
B)Flash the BIOS.
C)Destroy the hard drives.
D)Format each drive.
سؤال
New laptops with Windows 7 have just arrived. These are intended to be used outside the company for business trips. To ensure the security of data, you utilize which option?

A)Windows Firewall
B)Bit Locker
C)Trusted Platform Module
سؤال
A specific program that uses a UDP protocol and has an assigned port number needs to pass through your firewall on a Windows 7 computer. How do you allow grant secure access?

A)Create a program to allow this access
B)Create an exception
C)Use the Add Port button
سؤال
Generally, one should not open any attachments sent from unknown senders through email. Which of the following attachments poses a maximum security risk if opened?

A)DOC
B)SCR
C)PDF
D)XLS
سؤال
An employee has just received a new laptop. She asks which threats the antivirus software typically prevents. Which of the following threats are commonly prevented?

A)Worms
B)Spam
C)Trojans
D)Viruses
سؤال
Which of the following can significantly increase the risk of unauthorized access on a wireless network?
I. Using WEP authentication.
II. Using low time intervals between successive beacons.
III. Using generic SSIDs.

A)I and II
B)I and III
C)II and III
D)All of the above
سؤال
What is the generic term for a hacker going through your trash to find critical information?

A)Dumpster diving.
B)Refuse searching.
C)Refuse diving.
D)Dumpster searching.
سؤال
Which of the following types of program is not destructive, but leach bandwidth in networks and can turn a speedy machine into a slow one?

A)Malware
B)Adware
C)Spyware
D)Grayware
سؤال
John is concerned about users using thumb drives to connect to USB ports on company workstations because this could facilitate data theft of sensitive files. What should he do to fix this concern?

A)Disable USB in the workstation BIOS.
B)Seal all USB ports.
C)Install Antivirus.
D)Install Firewall.
سؤال
The only way to ensure that a hard disk is completely wiped so data cannot be retrieved from it, is:

A)Degaussing
B)Shredding
C)Drilling
D)Drive Wiping
سؤال
Which of the following characterizes malware that enables privileged access to the operating system and therefore is able to conceal itself from normal detection methods?

A)Trojans
B)Rootkits
C)Worms
D)Spyware
سؤال
Which of the following would help prevent threats from CDs or DVDs?

A)Restricting user permissions.
B)Setting strong passwords.
C)Changing default user names.
D)Disabling autorun.
سؤال
What type of malware encrypts data and holds data hostage for a fee to decrypt it?

A)Ransomware
B)Viruses
C)Trojans
D)Rootkits
سؤال
What type of attack is used to phish data from specific employees such as executives?

A)Spear phishing
B)Spoofing
C)Shoulder surfing
D)Zero day
سؤال
What can be used on a Windows system to fully encrypt the hard drive?

A)IIS
B)FTP
C)BitLocker
D)PGP
سؤال
What is common on Android phones to unlock the device?

A)Fingerprint lock
B)Face lock
C)Swipe lock
D)Biometric lock
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Security
1
Which of the following firewall ports must be open to allow FTP traffic?

A)Port 20 and 22
B)Port 25 and 110
C)Port 20 and 21
D)Port 80 and 443
Port 20 and 21
2
Which of the following attacks can be prevented if you shred all confidential material before dumping it in the waste bins?

A)Man-in-the-middle
B)Shoulder surfing
C)Phishing
D)Dumpster diving
Dumpster diving
3
When should passwords be allowed to be sent as plain text over a public network?

A)Never
B)When the password protected resources are fairly unimportant
C)When using Secure Shell
D)When the communications are secured by SSL or TLS
Never
4
Jack walks back to his desk and tries to log on to his computer. He receives a message that states he needs to contact his administrator because his account is locked. What could have been the probable cause?

A)An intruder has tried logging on to his system. On successive failed attempts, the account lockout policy has locked his PC.
B)The entire network is down.
C)He has left some application open on his computer, which has locked the system.
D)He needs to continue to try logging on. Eventually the system will allow him to log in.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
Harriet has just switched on her system and opened a Word document. Unprompted, her computer suddenly connects to the Internet. What kind of attack is this a symptom of?

A)An ACK attack
B)A worm
C)A logic bomb
D)A virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
Harriet the IT Administrator is getting frequent complaints from users that they are receiving unsolicited e-mails from an e-mail address. What should she do to prevent this from occurring?

A)Install an anti-spam filter on the domain mail servers and filter the email address.
B)Configure Outlook to block these e-mails.
C)Configure a rule in each user's router and restart the router.
D)Configure the firewall to block the e-mails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
David is the Security Advisor at his organization. He is predicting a rapid growth in the number of systems connecting to the corporate network. He wants to hide segments of the network from other segments and thereby control access to data on the network. Which of the following should he implement?

A)A security zone
B)NAT
C)MAC
D)VLAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
Your boss asks you to send a memo to the company on recommended password practices for company computers. Besides recommending the best types of passwords, you want to describe which practices to avoid when creating a password. Which of the following practices do you recommend against? Choose two.

A)Using the same password for every login.
B)Incorporating symbols into passwords.
C)Using different passwords for different logins.
D)Not being able to remember all of the passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
Of the following biometric methods, which is the least reliable for security purposes?

A)Retina scan
B)Voice analysis
C)Fingerprint scan
D)Hand analysis (geometry scan)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following should Mary set up on her Wi-Fi router to make it as secure as possible?

A)NTFS
B)WPA
C)DHCP
D)WPA2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
An intern with your IT department needs to know more about wireless security. Of the following, which are valid wireless encryption types?

A)SSID
B)WPA
C)WEP
D)SSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
Jill is trying to install an antivirus on her computer. Despite repeated attempts she is not able to install the antivirus software. What could be the most likely problem?

A)It is an old version of the antivirus software.
B)She has just re-installed the operating system.
C)She has Microsoft office running on the computer.
D)She is logged in as a guest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
A confirmed user in your Active Directory network calls and has forgotten his password. He asks you for the password. To ensure a basic security standard and a prompt resolution, you:

A)Locate the password and tell him the password.
B)Reset the password on his computer to a temporary password, advise him of the temporary password and to change this (the password) to a permanent password once he logs in.
C)Set an appointment to manually change the password at his computer.
D)Tell him to speak to his supervisor, who needs to request the password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of these tools should be used to enable auditing on a local level?

A)Local Security Settings
B)AD policy
C)Group Policy
D)User Settings
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
Your IT Director is concerned about the data stored on retired computers. You have been tasked to recommend a security procedure that prevents the data (on the hard drive) from being recovered. What is the best procedure?

A)Recycle the hard drives.
B)Flash the BIOS.
C)Destroy the hard drives.
D)Format each drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
New laptops with Windows 7 have just arrived. These are intended to be used outside the company for business trips. To ensure the security of data, you utilize which option?

A)Windows Firewall
B)Bit Locker
C)Trusted Platform Module
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
A specific program that uses a UDP protocol and has an assigned port number needs to pass through your firewall on a Windows 7 computer. How do you allow grant secure access?

A)Create a program to allow this access
B)Create an exception
C)Use the Add Port button
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
Generally, one should not open any attachments sent from unknown senders through email. Which of the following attachments poses a maximum security risk if opened?

A)DOC
B)SCR
C)PDF
D)XLS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
An employee has just received a new laptop. She asks which threats the antivirus software typically prevents. Which of the following threats are commonly prevented?

A)Worms
B)Spam
C)Trojans
D)Viruses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following can significantly increase the risk of unauthorized access on a wireless network?
I. Using WEP authentication.
II. Using low time intervals between successive beacons.
III. Using generic SSIDs.

A)I and II
B)I and III
C)II and III
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is the generic term for a hacker going through your trash to find critical information?

A)Dumpster diving.
B)Refuse searching.
C)Refuse diving.
D)Dumpster searching.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following types of program is not destructive, but leach bandwidth in networks and can turn a speedy machine into a slow one?

A)Malware
B)Adware
C)Spyware
D)Grayware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
John is concerned about users using thumb drives to connect to USB ports on company workstations because this could facilitate data theft of sensitive files. What should he do to fix this concern?

A)Disable USB in the workstation BIOS.
B)Seal all USB ports.
C)Install Antivirus.
D)Install Firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
The only way to ensure that a hard disk is completely wiped so data cannot be retrieved from it, is:

A)Degaussing
B)Shredding
C)Drilling
D)Drive Wiping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following characterizes malware that enables privileged access to the operating system and therefore is able to conceal itself from normal detection methods?

A)Trojans
B)Rootkits
C)Worms
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following would help prevent threats from CDs or DVDs?

A)Restricting user permissions.
B)Setting strong passwords.
C)Changing default user names.
D)Disabling autorun.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
What type of malware encrypts data and holds data hostage for a fee to decrypt it?

A)Ransomware
B)Viruses
C)Trojans
D)Rootkits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
What type of attack is used to phish data from specific employees such as executives?

A)Spear phishing
B)Spoofing
C)Shoulder surfing
D)Zero day
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
What can be used on a Windows system to fully encrypt the hard drive?

A)IIS
B)FTP
C)BitLocker
D)PGP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
What is common on Android phones to unlock the device?

A)Fingerprint lock
B)Face lock
C)Swipe lock
D)Biometric lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.