Deck 15: Computer and Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/132
Play
Full screen (f)
Deck 15: Computer and Network Security
1
A good password guideline is to use five characters with uppercase and lowercase letters and other characters.
False
2
In a Windows domain environment, the userid and password are created, stored, and maintained on a centralized server.
True
3
The Ctrl+Alt+Del keys can be used to lock your Windows workstation.
True
4
A benefit of electronic key cards is that they are cheaper than keys.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
5
You can encrypt someone elseʹs files for a different user.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
6
Keeping the File and Print Sharing enabled even if nothing is being shared on a computer is a good idea so that updates can be applied to this portion of the operating system in case they are ever reenabled.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
7
Another name for event logging is auditing.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
8
Antivirus and antispyware are not needed if a firewall is in place.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
9
A security policy is a policy written and recommended by IEEE.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
10
Applying operating system and application patches and updates is a good security practice.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
11
An RFID tag is commonly used for property security.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
12
A special laptop feature that enables a lock or alarm to be attached is known as a PC Card.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
13
A proxy server acts as an agent between a Web browser and a real server.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
14
A retinal scanner is a type of physical security device.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
15
Encryption is scrambling data so that it cannot be recognized.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
16
Authentication is the part of the operating system that determines what resources can be accessed and used across the network.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
17
By making a subfolder private, it is not automatically shared when the parent folder is shared.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
18
A firewall is a hardware device, not software.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
19
Another name for a DES card is a security token.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
20
Windows XP supports a maximum of 25 people accessing the same network share on a computer.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
21
Active scripts are used so that web pages stay static and do not change except for the data entered into textboxes or customer-driven scripts.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
22
PGP or S/MIME is used to protect email.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
23
When WEP is configured on the access point, all wireless clients must use WEP.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
24
A new file is created and stored in an encrypted folder. The file must be manually encrypted because it was added after the folder was encrypted.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
25
An email that comes from what appears to be your own bank, but actually is not, is an example of spyware.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
26
SSID broadcasting is when an access point sends out its WEP key to all wireless clients through the air. Those clients attached to the access point are allowed to transmit data.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
27
WEP is a type of wireless authentication technique.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
28
40-bit WEP and 64-bit WEP are the same thing.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
29
Phishing is controlled by using S/MIME.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
30
Mobile devices do not need antivirus software.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
31
A firewall cannot protect a wireless network.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
32
Grayware is a generic term for application or files that affect the computerʹs performance and cause it to act unusual.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
33
When you have a personal incident of child exploitation, you should report it to the FBI.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
34
Adware would show up as one or more pop-ups on a computer.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
35
A SPAN is a special type of security network.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
36
When you have a personal incident of phishing, you should report it to the FBI.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
37
A program that you have never used is trying to access your computer and the Windows firewall notices it. An alert comes up, and you use the Keep Blocking This Program option so that the program is effectively blocked.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
38
802.1x security standards can be applied to wireless networks.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
39
TKIP and AES improve WEP encryption.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
40
A cookie is a special program written to collect information and store it on the hard drive.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
41
The part of the security policy that defines what company resources can be accessed from home is
A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
42
A _______ is a document that provides rules and guidelines for security.
A) RFP
B) MSDS
C) Domain policy
D) Security policy
A) RFP
B) MSDS
C) Domain policy
D) Security policy
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
43
Vista does not support private folders.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
44
The part of the security policy that defines the appropriate use of company data is
A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
45
What is an alternative to room keys for better security?
A) Key card
B) RFID
C) Hardware token
D) USS
A) Key card
B) RFID
C) Hardware token
D) USS
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
46
A remote lock would most likely be used on a netbook.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
47
Keeping the documentation for a new printer so that you are prepared when a problem occurs helps build customer trust.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
48
What keystrokes are used to lock a Windows computer?
A) F1
B) Ctrl+Alt+Esc
C) Ctrl+Alt+Del
D) Alt+F8
E) Shift+Ctrl+F8
A) F1
B) Ctrl+Alt+Esc
C) Ctrl+Alt+Del
D) Alt+F8
E) Shift+Ctrl+F8
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
49
You can build customer trust by being honest.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
50
Port forwarding on a home router must be enabled for port 3389 for a technician to access a Windows 7 home computer using Remote Desktop.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
51
The part of the security policy that defines who has keys to the server room is
A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
52
What file system provides the best Windows security?
A) FAT16
B) FAT32
C) NTFS
D) OS2
A) FAT16
B) FAT32
C) NTFS
D) OS2
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
53
What technology is also known as a hardware token?
A) Key card
B) RFID
C) Hardware fob
D) USS
E) Security token
A) Key card
B) RFID
C) Hardware fob
D) USS
E) Security token
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
54
An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do?
A) Manually delete the file.
B) Repartition the hard drive.
C) Reload the operating system.
D) Use a better antivirus application.
A) Manually delete the file.
B) Repartition the hard drive.
C) Reload the operating system.
D) Use a better antivirus application.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
55
The iOS Settings > General option is used to set a passcode lock.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
56
What Windows XP control panel can be used so the computer cannot be seen through My Network Places?
A) Administrative Tools
B) Network Connections
C) System
D) Add/Remove Windows Components
A) Administrative Tools
B) Network Connections
C) System
D) Add/Remove Windows Components
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
57
What technology is used to add hardware to protect laptops?
A) Key card
B) RFID
C) Hardware token
D) USS
A) Key card
B) RFID
C) Hardware token
D) USS
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
58
A fingerprint scanner is what type of device?
A) USS
B) Hardware token
C) Biometric
D) Key fob
A) USS
B) Hardware token
C) Biometric
D) Key fob
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
59
To protect data so it cannot be easily read, what technology is used?
A) Authentication
B) Encryption
C) Authorization
D) Firewalling
A) Authentication
B) Encryption
C) Authorization
D) Firewalling
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
60
What technology could be used to locate lost pets?
A) Key card
B) RFID
C) Hardware token
D) USS
A) Key card
B) RFID
C) Hardware token
D) USS
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
61
Where could you see the people who have logged onto a computer in the past 48 hours?
A) Event View security log
B) Device Manager security option
C) Computer Management toolʹs Local Users and Groups option
D) Boot to Safe Mode and select the Security boot option
A) Event View security log
B) Device Manager security option
C) Computer Management toolʹs Local Users and Groups option
D) Boot to Safe Mode and select the Security boot option
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
62
What security term defines what resources can be accessed and used?
A) Encryption
B) Authentication
C) Authorization
D) Access level security
A) Encryption
B) Authentication
C) Authorization
D) Access level security
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
63
Which file system enables administrators to assign permissions to control access to network resources including encryption?
A) FAT32
B) EFS
C) CDFS
D) NTFS
A) FAT32
B) EFS
C) CDFS
D) NTFS
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
64
Which technique provides more security for the clients on a wireless network?
A) Disable SSID broadcasting
B) Enable WPA2
C) Enable infrastructure mode
D) Change the default password
A) Disable SSID broadcasting
B) Enable WPA2
C) Enable infrastructure mode
D) Change the default password
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
65
What type of userid and password is kept on a Windows XP computer?
A) Local
B) Domain
C) Active domain
D) Infrastructure
A) Local
B) Domain
C) Active domain
D) Infrastructure
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
66
A technique in which an attacker captures a packet and uses computer information to pretend to be the sending computer is known as
A) A denial-of-service attack
B) Session hijacking
C) Spam
D) Phishing
A) A denial-of-service attack
B) Session hijacking
C) Spam
D) Phishing
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
67
What should you do if someone is looking over your shoulder as you log onto your computer?
A) Type your password quickly.
B) Ask them to leave the room.
C) Type your password at your normal pace so that you donʹt make a mistake, but tap your thumb a couple of times as if you are typing a key.
D) Wait until they are not looking to type your password.
A) Type your password quickly.
B) Ask them to leave the room.
C) Type your password at your normal pace so that you donʹt make a mistake, but tap your thumb a couple of times as if you are typing a key.
D) Wait until they are not looking to type your password.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following statements are true regarding encryption?
A) Windows files can be encrypted only if the NTFS partition is marked as active.
B) Windows uses USS for encrypting files and folders.
C) You can encrypt someone elseʹs files if you have the correct permissions.
D) Folders that are encrypted must be accessed using the UNC.
A) Windows files can be encrypted only if the NTFS partition is marked as active.
B) Windows uses USS for encrypting files and folders.
C) You can encrypt someone elseʹs files if you have the correct permissions.
D) Folders that are encrypted must be accessed using the UNC.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
69
A wireless access point connects to the wired network. What can you do to prevent unauthorized users from accessing shared files on the wired network?
A) Disable SSID broadcasting on the access point.
B) Enable WEP, TKIP, or AES on the access point.
C) Configure NTFS permissions on the shares.
D) Install a firewall for the networks.
A) Disable SSID broadcasting on the access point.
B) Enable WEP, TKIP, or AES on the access point.
C) Configure NTFS permissions on the shares.
D) Install a firewall for the networks.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
70
Which Windows 7 control panel is used to configure the firewall?
A) Network Connections
B) System and Security
C) Hardware
D) Computer Safety
A) Network Connections
B) System and Security
C) Hardware
D) Computer Safety
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
71
What network environment has centralized servers for authentication?
A) Local
B) Domain
C) Infrastructure
D) Ad hoc
A) Local
B) Domain
C) Infrastructure
D) Ad hoc
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
72
Another name for event logging is
A) Authentication
B) Authorization
C) Encryption
D) None of these are names for event logging.
A) Authentication
B) Authorization
C) Encryption
D) None of these are names for event logging.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
73
What security term describes a program written to collect information and store it on the hard drive?
A) Virus
B) Intrusion detection and alerts
C) Cookie
D) Authentication
A) Virus
B) Intrusion detection and alerts
C) Cookie
D) Authentication
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
74
Why are words such as monkey, smile, and freedom not good to use as passwords?
A) They are in password crack dictionaries.
B) They are easy to guess.
C) They are easy to see when typing.
D) They are the three most commonly used passwords.
A) They are in password crack dictionaries.
B) They are easy to guess.
C) They are easy to see when typing.
D) They are the three most commonly used passwords.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
75
What security term describes scrambling data so that it cannot be read?
A) Encryption
B) Authentication
C) Authorization
D) Auditing
A) Encryption
B) Authentication
C) Authorization
D) Auditing
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
76
What is the minimum number of characters a password should be?
A) Five
B) Six
C) Seven
D) Eight
E) Nine
A) Five
B) Six
C) Seven
D) Eight
E) Nine
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
77
What is the maximum number of simultaneous users that can access a Windows 7 share?
A) 20
B) 45
C) 60
D) 8
E) 10
A) 20
B) 45
C) 60
D) 8
E) 10
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
78
Which password would be most secure?
A) byteme
B) 1adyVol3
C) cAtchm3
D) Tennessee
A) byteme
B) 1adyVol3
C) cAtchm3
D) Tennessee
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
79
Which statement is true about network shares?
A) Network shares cannot be accessed locally on the computer doing the sharing.
B) A network share cannot contain encrypted files.
C) Windows network shares can be accessed only by Windows-based computers.
D) If a folder is shared, all subfolders are automatically shared.
A) Network shares cannot be accessed locally on the computer doing the sharing.
B) A network share cannot contain encrypted files.
C) Windows network shares can be accessed only by Windows-based computers.
D) If a folder is shared, all subfolders are automatically shared.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
80
What Windows feature enables file and folder encryption?
A) PCI/E
B) EFS
C) USS
D) ENT
A) PCI/E
B) EFS
C) USS
D) ENT
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck