Deck 19: Security Essentials

ملء الشاشة (f)
exit full mode
سؤال
A ____ is made of several words with spaces allowed.

A)password
B)passphrase
C)token
D)credential
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A Trojan sometimes installs a ____ in the system,which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.

A)backdoor
B)release
C)helper
D)beneficial routine
سؤال
When implementing a security plan,the four steps are sometimes called the ____.

A)Plan-Build-Run-Act
B)Plan-Build-Review-Act
C)Plan-Do-Study-Act
D)Plan-Study-Act-Review
سؤال
Individuals are always free to decide what security measures they want to use.
سؤال
A(n)____ account has complete access to the system and can make changes that affect the security of the system and other users.

A)service
B)administrator
C)privileged
D)user
سؤال
A ____ virus can hide in either of two boot areas of a hard drive.

A)partition
B)Trojan
C)polymorphic
D)boot sector
سؤال
Internet Explorer includes the pop-up blocker,the ability to manage add-ons,the ability to block scripts and disable scripts embedded in Web pages,and the ability to set the general security level.
سؤال
The International Organization for Standardization has developed two documents (____),which describe,in detail,the recommended standards to secure computer resources.

A)BS 7799 and ISO 17799
B)ISO 17799 and ISO 27002
C)ISO 17799 and ISO 27001
D)ISO 27001 and ISO 7799
سؤال
____ is any annoying and unwanted program that might or might not mean you harm.

A)Malware
B)Grayware
C)Testware
D)Adware
سؤال
Don't use the same password on more than one system (computer,network,or application).
سؤال
A network ____ map is one of the most powerful and versatile methods of communicating over a network.

A)access
B)interface
C)drive
D)control
سؤال
For the health care industry,the ____ includes regulations to secure patient data that apply to all health care companies and professionals.

A)GLB
B)NIST
C)SOX
D)HIPAA
سؤال
When you are responsible for the security of a computer or small network,make it a habit to check every computer for which you are responsible every day.
سؤال
Most encryption software products use a method called ____.

A)Private Key Encryption
B)Symmetric Key Encryption
C)Shared Secret Encryption
D)Public Key Encryption
سؤال
A ____ is assigned by a Certification Authority,and is used to prove you are who you say you are.

A)password
B)token
C)digital certificate
D)credential
سؤال
A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.

A)weak
B)usable
C)unbreakable
D)strong
سؤال
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.

A)permissions
B)controls
C)authentication
D)sensitivity
سؤال
Because of the problem of losing encrypted data and Internet passwords when a user password is reset,each new user should create a password ____ disk for use in the event the user forgets the password.

A)reset
B)recovery
C)vault
D)conversion
سؤال
A(n)____ account has read-write access only on its own folders,read-only access to most system folders,and no access to other users' data.

A)user
B)administrator
C)limited
D)privileged
سؤال
It's best to use three-factor authentication.
سؤال
Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive.

A)partition utility
B)diagnostic utility
C)cloning utility
D)zero-fill utility
سؤال
A(n)____________________ virus is a virus that hides in a script,which might execute when you click a link on a Web page or in an HTML e-mail message or when you attempt to open an e-mail attachment.
سؤال
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Substitutes itself for a legitimate program
سؤال
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Junk e-mail that you don't want,you didn't ask for,and that gets in your way
سؤال
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Proves that an individual is who he says he is and is accomplished by a variety of techniques
سؤال
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Dormant code added to software and triggered at a predetermined time or by a predetermined event
سؤال
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Malware that loads itself before the OS boot is complete
سؤال
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
The most common viruses spread by e-mail
سؤال
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Hides in an executable program having an .exe,.com,.sys,.vbs,or other executable file extension,or in a word-processing document that contains a macro
سؤال
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself.
سؤال
Generally speaking,the weakest link in setting up security in a computer environment is ____.

A)the network
B)the operating system
C)people
D)the hardware
سؤال
____________________ is the default authentication protocol used by Windows Vista/XP.
سؤال
A(n)____________________ is a program that replicates by attaching itself to other programs.
سؤال
As part of the authentication process,rather than proving a person is in possession of a token,some systems are set to use ____________________ data to validate the person's physical body.
سؤال
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Determines what an individual can do in the system
سؤال
As a part of managing the security of a computer or network,your organization might make you accountable to fill out a(n)____________________ report of unusual or atypical events.
سؤال
As a defensive and offensive measure to protect against malicious software,install and run ____ software and keep it current.

A)virus
B)antivirus
C)spyware
D)Trojan
سؤال
In the computer arena,____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.

A)social engineering
B)social hacking
C)hacktivism
D)social motivation
سؤال
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.

A)polymorphic
B)boot sector
C)multipartite
D)macro
سؤال
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.

A)multipartite
B)macro
C)polymorphic
D)boot sector
سؤال
Describe what adware is.
سؤال
List and describe four rules that can help you use the Internet responsibility.
سؤال
Describe Smart Cards.
سؤال
Discuss what is involved in the Study step of the PDSA cycle.
سؤال
Discuss what is involved in the Plan step of the PDSA cycle.
سؤال
Explain the purpose of authorization.
سؤال
Explain the purpose of authentication.
سؤال
List five criteria for a strong password.
سؤال
Explain a drive lock password.
سؤال
List three ways to lock down your workstation each time you step away from your desk.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 19: Security Essentials
1
A ____ is made of several words with spaces allowed.

A)password
B)passphrase
C)token
D)credential
B
2
A Trojan sometimes installs a ____ in the system,which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.

A)backdoor
B)release
C)helper
D)beneficial routine
A
3
When implementing a security plan,the four steps are sometimes called the ____.

A)Plan-Build-Run-Act
B)Plan-Build-Review-Act
C)Plan-Do-Study-Act
D)Plan-Study-Act-Review
C
4
Individuals are always free to decide what security measures they want to use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n)____ account has complete access to the system and can make changes that affect the security of the system and other users.

A)service
B)administrator
C)privileged
D)user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ____ virus can hide in either of two boot areas of a hard drive.

A)partition
B)Trojan
C)polymorphic
D)boot sector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Internet Explorer includes the pop-up blocker,the ability to manage add-ons,the ability to block scripts and disable scripts embedded in Web pages,and the ability to set the general security level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
The International Organization for Standardization has developed two documents (____),which describe,in detail,the recommended standards to secure computer resources.

A)BS 7799 and ISO 17799
B)ISO 17799 and ISO 27002
C)ISO 17799 and ISO 27001
D)ISO 27001 and ISO 7799
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
____ is any annoying and unwanted program that might or might not mean you harm.

A)Malware
B)Grayware
C)Testware
D)Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Don't use the same password on more than one system (computer,network,or application).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
A network ____ map is one of the most powerful and versatile methods of communicating over a network.

A)access
B)interface
C)drive
D)control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
For the health care industry,the ____ includes regulations to secure patient data that apply to all health care companies and professionals.

A)GLB
B)NIST
C)SOX
D)HIPAA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
When you are responsible for the security of a computer or small network,make it a habit to check every computer for which you are responsible every day.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Most encryption software products use a method called ____.

A)Private Key Encryption
B)Symmetric Key Encryption
C)Shared Secret Encryption
D)Public Key Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
A ____ is assigned by a Certification Authority,and is used to prove you are who you say you are.

A)password
B)token
C)digital certificate
D)credential
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.

A)weak
B)usable
C)unbreakable
D)strong
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.

A)permissions
B)controls
C)authentication
D)sensitivity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Because of the problem of losing encrypted data and Internet passwords when a user password is reset,each new user should create a password ____ disk for use in the event the user forgets the password.

A)reset
B)recovery
C)vault
D)conversion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
A(n)____ account has read-write access only on its own folders,read-only access to most system folders,and no access to other users' data.

A)user
B)administrator
C)limited
D)privileged
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
It's best to use three-factor authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive.

A)partition utility
B)diagnostic utility
C)cloning utility
D)zero-fill utility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n)____________________ virus is a virus that hides in a script,which might execute when you click a link on a Web page or in an HTML e-mail message or when you attempt to open an e-mail attachment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Substitutes itself for a legitimate program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Junk e-mail that you don't want,you didn't ask for,and that gets in your way
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Proves that an individual is who he says he is and is accomplished by a variety of techniques
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Dormant code added to software and triggered at a predetermined time or by a predetermined event
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Malware that loads itself before the OS boot is complete
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
The most common viruses spread by e-mail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Hides in an executable program having an .exe,.com,.sys,.vbs,or other executable file extension,or in a word-processing document that contains a macro
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Generally speaking,the weakest link in setting up security in a computer environment is ____.

A)the network
B)the operating system
C)people
D)the hardware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
____________________ is the default authentication protocol used by Windows Vista/XP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n)____________________ is a program that replicates by attaching itself to other programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
As part of the authentication process,rather than proving a person is in possession of a token,some systems are set to use ____________________ data to validate the person's physical body.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match each term with the correct statement below.
a.Rootkit
b.File virus
c.Logic bomb
d.Authentication
e.Spam"
f.Macro viruses
h.Phishing
i.Authorization
g.Trojan horse
Determines what an individual can do in the system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
As a part of managing the security of a computer or network,your organization might make you accountable to fill out a(n)____________________ report of unusual or atypical events.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
As a defensive and offensive measure to protect against malicious software,install and run ____ software and keep it current.

A)virus
B)antivirus
C)spyware
D)Trojan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
In the computer arena,____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.

A)social engineering
B)social hacking
C)hacktivism
D)social motivation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.

A)polymorphic
B)boot sector
C)multipartite
D)macro
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.

A)multipartite
B)macro
C)polymorphic
D)boot sector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe what adware is.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
List and describe four rules that can help you use the Internet responsibility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe Smart Cards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Discuss what is involved in the Study step of the PDSA cycle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Discuss what is involved in the Plan step of the PDSA cycle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Explain the purpose of authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Explain the purpose of authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
List five criteria for a strong password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Explain a drive lock password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
List three ways to lock down your workstation each time you step away from your desk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.