Deck 18: Computer and Network Security

ملء الشاشة (f)
exit full mode
سؤال
In what instance would an AUP be relevant?

A)When someone walks by and sees someone with child pornography opened in a browser
B)When someone accesses a network wiring closet and the event is logged
C)When someone has requested access to a shared folder or rights to a particular part of a system
D)When someone has requested badge/key access to the network operations center
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following would help with tailgating?
[ mantrap | password security | TPM | computer cage ]
سؤال
Which of the following would help with shoulder surfing?
[ mantrap | password security | tracking module | privacy filter ]
سؤال
What does LoJack do?

A)Generates and stores cryptographic keys
B)Allows locating and possibly controlling a lost or remote mobile device
C)Provides unrestricted access to BIOS/UEFI options
D)Provides security rules specific to email
سؤال
Which security technology would be used to protect an organization against an external digital threat? [ mantrap | TPM | firewall | computer cage ]
سؤال
List one benefit of an electronic key card.
سؤال
What is the practice of an unauthorized person entering a space behind an authorized person called?
[ tailgating | phishing | spear phishing | tracking ]
سؤال
Which security threat poses as a legitimate source because it contains personal information that is legitimate? [ Trojan virus | rootkit | botnet | spear phishing ]
سؤال
Which security threat does not allow user access to a device until the user pays money?
[ Trojan | piracy | malware | ransomware ]
سؤال
In one or more sentences, describe the difference between an IDS and IPS using good grammar, capitalization, and punctuation.
سؤال
What is used to gain administrator access to a Linux operating system?
[ Trojan virus | botnet | spyware | rootkit ]
سؤال
Someone buys a cheap game at a store and then gives the same game to the neighbor to install.Which term describes this act? [ shoulder surfing | piracy | malware | ransomware ]
سؤال
Which security technology would help with spam?
[ multifactor authentication | VPN | firewall | email filtering ]
سؤال
Which type of license would be used for Microsoft Office licensed to all desktops in a college?
[ open source | personal | licensed | commercial ]
سؤال
Which security measure might help locate a lost mobile device?
[ mantrap | tracking module | TPM | computer cage ]
سؤال
List one way in which a biometric device might be used in computer and/or network security.
سؤال
Which of the following would be considered PII? (Choose all that apply.)
[ employee ID | unique password | someone's age | person's name | corporate user ID ]
سؤال
Which two of the following should be required if a company has an outside company that destroys sensitive corporate documents? (Choose two.)
[ tracking module | certificate of destruction | privacy filter | AUP | proof of incineration | multifactor authentication ]
سؤال
Which security technology would be used to have secure data communication with a corporate network across the Internet? [ TPM | VPN | DLP | email filtering ]
سؤال
Where would the number and type of characters required for a corporate password be documented?

A)In a log file
B)In the CIO folder
C)In a locked cabinet in an offsite facility
D)In the security policy
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 18: Computer and Network Security
1
In what instance would an AUP be relevant?

A)When someone walks by and sees someone with child pornography opened in a browser
B)When someone accesses a network wiring closet and the event is logged
C)When someone has requested access to a shared folder or rights to a particular part of a system
D)When someone has requested badge/key access to the network operations center
C
2
Which of the following would help with tailgating?
[ mantrap | password security | TPM | computer cage ]
Mantrap
3
Which of the following would help with shoulder surfing?
[ mantrap | password security | tracking module | privacy filter ]
Privacy filter
4
What does LoJack do?

A)Generates and stores cryptographic keys
B)Allows locating and possibly controlling a lost or remote mobile device
C)Provides unrestricted access to BIOS/UEFI options
D)Provides security rules specific to email
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which security technology would be used to protect an organization against an external digital threat? [ mantrap | TPM | firewall | computer cage ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
List one benefit of an electronic key card.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is the practice of an unauthorized person entering a space behind an authorized person called?
[ tailgating | phishing | spear phishing | tracking ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which security threat poses as a legitimate source because it contains personal information that is legitimate? [ Trojan virus | rootkit | botnet | spear phishing ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which security threat does not allow user access to a device until the user pays money?
[ Trojan | piracy | malware | ransomware ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
In one or more sentences, describe the difference between an IDS and IPS using good grammar, capitalization, and punctuation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is used to gain administrator access to a Linux operating system?
[ Trojan virus | botnet | spyware | rootkit ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
Someone buys a cheap game at a store and then gives the same game to the neighbor to install.Which term describes this act? [ shoulder surfing | piracy | malware | ransomware ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which security technology would help with spam?
[ multifactor authentication | VPN | firewall | email filtering ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which type of license would be used for Microsoft Office licensed to all desktops in a college?
[ open source | personal | licensed | commercial ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which security measure might help locate a lost mobile device?
[ mantrap | tracking module | TPM | computer cage ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
List one way in which a biometric device might be used in computer and/or network security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following would be considered PII? (Choose all that apply.)
[ employee ID | unique password | someone's age | person's name | corporate user ID ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which two of the following should be required if a company has an outside company that destroys sensitive corporate documents? (Choose two.)
[ tracking module | certificate of destruction | privacy filter | AUP | proof of incineration | multifactor authentication ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which security technology would be used to have secure data communication with a corporate network across the Internet? [ TPM | VPN | DLP | email filtering ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
Where would the number and type of characters required for a corporate password be documented?

A)In a log file
B)In the CIO folder
C)In a locked cabinet in an offsite facility
D)In the security policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.