Вы находитесь на странице: 1из 13

A+ Review Quizzes Ch19

Question 1 Correct Mark 9 out of 9

Flag question

Question text Match the Best Answer

Proves that an individual is who he says he is and is accomplished by a variety of techniques Determines what an individual can do in the system

Authentication

Authorization

Junk e-mail that you dont want, you didnt ask for, and that gets in your way A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself. Dormant code added to software and triggered at a predetermined time or by a predetermined event Substitutes itself for a legitimate program Hides in an executable program having an .exe, .com, .sys, .vbs, or other executable file extension, or in a word-processing document that contains a macro The most common viruses spread by e-mail

Spam

Phishing

Logic bomb

Trojan horse

File virus

Macro viruses

Malware that loads itself before the OS boot is complete


Feedback

Rootkit

The correct answer is: Proves that an individual is who he says he is and is accomplished by a variety of techniques Authentication, Determines what an individual can do in the system Authorization, Junk e-mail that you dont want, you didnt ask for, and that gets in your way Spam, A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself. Phishing, Dormant code added to software and triggered at a predetermined time or by a predetermined event Logic bomb, Substitutes itself for a legitimate program Trojan horse, Hides in an executable program having an

.exe, .com, .sys, .vbs, or other executable file extension, or in a word-processing document that contains a macro File virus, The most common viruses spread by e-mail Macro viruses, Malware that loads itself before the OS boot is complete Rootkit.
Question 2 Correct Mark 1 out of 1

Flag question

Question text The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources. Select one: a. BS 7799 and ISO 17799 b. ISO 17799 and ISO 27002 c. ISO 17799 and ISO 27001 d. ISO 27001 and ISO 7799 Feedback The correct answer is: ISO 17799 and ISO 27002.
Question 3 Correct Mark 1 out of 1

Flag question

Question text For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals. Select one: a. GLB b. NIST c. SOX d. HIPAA Feedback The correct answer is: HIPAA.

Question 4 Correct Mark 1 out of 1

Flag question

Question text When implementing a security plan, the four steps are sometimes called the ____. Select one: a. Plan-Build-Run-Act b. Plan-Build-Review-Act c. Plan-Do-Study-Act d. Plan-Study-Act-Review Feedback The correct answer is: Plan-Do-Study-Act.
Question 5 Correct Mark 1 out of 1

Flag question

Question text Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password. Select one: a. reset b. recovery c. vault d. conversion Feedback The correct answer is: reset.
Question 6 Correct Mark 1 out of 1

Flag question

Question text A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are. Select one: a. password b. token c. digital certificate d. credential Feedback The correct answer is: digital certificate.
Question 7 Correct Mark 1 out of 1

Flag question

Question text A ____ is made of several words with spaces allowed. Select one: a. password b. passphrase c. token d. credential Feedback The correct answer is: passphrase.
Question 8 Correct Mark 1 out of 1

Flag question

Question text A ____ password means it is not easy to guess by both humans and computer programs designed to hack passwords. Select one: a. weak b. usable c. unbreakable d. strong Feedback The correct answer is: strong.
Question 9 Correct Mark 1 out of 1

Flag question

Question text A ____ account has complete access to the system and can make changes that affect the security of the system and other users. Select one: a. service b. administrator c. privileged d. user Feedback The correct answer is: administrator.
Question 10 Correct Mark 1 out of 1

Flag question

Question text A ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users data.

Select one: a. user b. administrator c. limited d. privileged Feedback The correct answer is: limited.
Question 11 Correct Mark 1 out of 1

Flag question

Question text Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data. Select one: a. permissions b. controls c. authentication d. sensitivity Feedback The correct answer is: permissions.
Question 12 Correct Mark 1 out of 1

Flag question

Question text A network ____ map is one of the most powerful and versatile methods of communicating over a network. Select one: a. access b. interface c. drive

d. control Feedback The correct answer is: drive.


Question 13 Correct Mark 1 out of 1

Flag question

Question text Most encryption software products use a method called ____. Select one: a. Private Key Encryption b. Symmetric Key Encryption c. Shared Secret Encryption d. Public Key Encryption Feedback The correct answer is: Public Key Encryption.
Question 14 Correct Mark 1 out of 1

Flag question

Question text ____ is any annoying and unwanted program that might or might not mean you harm. Select one: a. Malware b. Grayware c. Testware d. Adware Feedback The correct answer is: Grayware.
Question 15

Correct Mark 1 out of 1

Flag question

Question text A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed. Select one: a. backdoor b. release c. helper d. beneficial routine Feedback The correct answer is: backdoor.
Question 16 Correct Mark 1 out of 1

Flag question

Question text A ____ virus can hide in either of two boot areas of a hard drive. Select one: a. partition b. Trojan c. polymorphic d. boot sector Feedback The correct answer is: boot sector.
Question 17 Correct Mark 1 out of 1

Flag question

Question text A ____ virus is a combination of a boot sector virus and a file virus and can hide in either. Select one: a. polymorphic b. boot sector c. multipartite d. macro Feedback The correct answer is: multipartite.
Question 18 Correct Mark 1 out of 1

Flag question

Question text A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination. Select one: a. multipartite b. macro c. polymorphic d. boot sector Feedback The correct answer is: macro.
Question 19 Correct Mark 1 out of 1

Flag question

Question text As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current. Select one: a. virus b. antivirus c. spyware d. Trojan Feedback The correct answer is: antivirus.
Question 20 Correct Mark 1 out of 1

Flag question

Question text Generally speaking, the weakest link in setting up security in a computer environment is ____. Select one: a. the network b. the operating system c. people d. the hardware Feedback The correct answer is: people.
Question 21 Correct Mark 1 out of 1

Flag question

Question text In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer. Select one:

a. social engineering b. social hacking c. hacktivism d. social motivation Feedback The correct answer is: social engineering.
Question 22 Correct Mark 1 out of 1

Flag question

Question text Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive. Select one: a. partition utility b. diagnostic utility c. cloning utility d. zero-fill utility Feedback The correct answer is: zero-fill utility.
Question 23 Correct Mark 1 out of 1

Flag question

Question text Individuals are always free to decide what security measures they want to use. Select one: True False Feedback The correct answer is 'False'.

Question 24 Correct Mark 1 out of 1

Flag question

Question text Its best to use three-factor authentication. Select one: True False Feedback The correct answer is 'False'.
Question 25 Correct Mark 1 out of 1

Flag question

Question text Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level. Select one: True False Feedback The correct answer is 'True'.
Question 26 Correct Mark 1 out of 1

Flag question

Question text

Dont use the same password on more than one system (computer, network, or application). Select one: True False Feedback The correct answer is 'True'.
Question 27 Correct Mark 1 out of 1

Flag question

Question text When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day. Select one: True False Feedback The correct answer is 'False'.