Deck 18: Computer and Network Security
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
العب
ملء الشاشة (f)
Deck 18: Computer and Network Security
1
In what instance would an AUP be relevant?
A)When someone walks by and sees someone with child pornography opened in a browser
B)When someone accesses a network wiring closet and the event is logged
C)When someone has requested access to a shared folder or rights to a particular part of a system
D)When someone has requested badge/key access to the network operations center
A)When someone walks by and sees someone with child pornography opened in a browser
B)When someone accesses a network wiring closet and the event is logged
C)When someone has requested access to a shared folder or rights to a particular part of a system
D)When someone has requested badge/key access to the network operations center
C
2
Which of the following would help with tailgating?
[ mantrap | password security | TPM | computer cage ]
[ mantrap | password security | TPM | computer cage ]
Mantrap
3
Which of the following would help with shoulder surfing?
[ mantrap | password security | tracking module | privacy filter ]
[ mantrap | password security | tracking module | privacy filter ]
Privacy filter
4
What does LoJack do?
A)Generates and stores cryptographic keys
B)Allows locating and possibly controlling a lost or remote mobile device
C)Provides unrestricted access to BIOS/UEFI options
D)Provides security rules specific to email
A)Generates and stores cryptographic keys
B)Allows locating and possibly controlling a lost or remote mobile device
C)Provides unrestricted access to BIOS/UEFI options
D)Provides security rules specific to email
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which security technology would be used to protect an organization against an external digital threat? [ mantrap | TPM | firewall | computer cage ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
List one benefit of an electronic key card.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is the practice of an unauthorized person entering a space behind an authorized person called?
[ tailgating | phishing | spear phishing | tracking ]
[ tailgating | phishing | spear phishing | tracking ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which security threat poses as a legitimate source because it contains personal information that is legitimate? [ Trojan virus | rootkit | botnet | spear phishing ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which security threat does not allow user access to a device until the user pays money?
[ Trojan | piracy | malware | ransomware ]
[ Trojan | piracy | malware | ransomware ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
In one or more sentences, describe the difference between an IDS and IPS using good grammar, capitalization, and punctuation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is used to gain administrator access to a Linux operating system?
[ Trojan virus | botnet | spyware | rootkit ]
[ Trojan virus | botnet | spyware | rootkit ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
Someone buys a cheap game at a store and then gives the same game to the neighbor to install.Which term describes this act? [ shoulder surfing | piracy | malware | ransomware ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which security technology would help with spam?
[ multifactor authentication | VPN | firewall | email filtering ]
[ multifactor authentication | VPN | firewall | email filtering ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which type of license would be used for Microsoft Office licensed to all desktops in a college?
[ open source | personal | licensed | commercial ]
[ open source | personal | licensed | commercial ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which security measure might help locate a lost mobile device?
[ mantrap | tracking module | TPM | computer cage ]
[ mantrap | tracking module | TPM | computer cage ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
List one way in which a biometric device might be used in computer and/or network security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following would be considered PII? (Choose all that apply.)
[ employee ID | unique password | someone's age | person's name | corporate user ID ]
[ employee ID | unique password | someone's age | person's name | corporate user ID ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which two of the following should be required if a company has an outside company that destroys sensitive corporate documents? (Choose two.)
[ tracking module | certificate of destruction | privacy filter | AUP | proof of incineration | multifactor authentication ]
[ tracking module | certificate of destruction | privacy filter | AUP | proof of incineration | multifactor authentication ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which security technology would be used to have secure data communication with a corporate network across the Internet? [ TPM | VPN | DLP | email filtering ]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
Where would the number and type of characters required for a corporate password be documented?
A)In a log file
B)In the CIO folder
C)In a locked cabinet in an offsite facility
D)In the security policy
A)In a log file
B)In the CIO folder
C)In a locked cabinet in an offsite facility
D)In the security policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck