Deck 18: Computer and Network Security

Full screen (f)
exit full mode
Question
In what instance would an AUP be relevant?

A)When someone walks by and sees someone with child pornography opened in a browser
B)When someone accesses a network wiring closet and the event is logged
C)When someone has requested access to a shared folder or rights to a particular part of a system
D)When someone has requested badge/key access to the network operations center
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following would help with tailgating?
[ mantrap | password security | TPM | computer cage ]
Question
Which of the following would help with shoulder surfing?
[ mantrap | password security | tracking module | privacy filter ]
Question
What does LoJack do?

A)Generates and stores cryptographic keys
B)Allows locating and possibly controlling a lost or remote mobile device
C)Provides unrestricted access to BIOS/UEFI options
D)Provides security rules specific to email
Question
Which security technology would be used to protect an organization against an external digital threat? [ mantrap | TPM | firewall | computer cage ]
Question
List one benefit of an electronic key card.
Question
What is the practice of an unauthorized person entering a space behind an authorized person called?
[ tailgating | phishing | spear phishing | tracking ]
Question
Which security threat poses as a legitimate source because it contains personal information that is legitimate? [ Trojan virus | rootkit | botnet | spear phishing ]
Question
Which security threat does not allow user access to a device until the user pays money?
[ Trojan | piracy | malware | ransomware ]
Question
In one or more sentences, describe the difference between an IDS and IPS using good grammar, capitalization, and punctuation.
Question
What is used to gain administrator access to a Linux operating system?
[ Trojan virus | botnet | spyware | rootkit ]
Question
Someone buys a cheap game at a store and then gives the same game to the neighbor to install.Which term describes this act? [ shoulder surfing | piracy | malware | ransomware ]
Question
Which security technology would help with spam?
[ multifactor authentication | VPN | firewall | email filtering ]
Question
Which type of license would be used for Microsoft Office licensed to all desktops in a college?
[ open source | personal | licensed | commercial ]
Question
Which security measure might help locate a lost mobile device?
[ mantrap | tracking module | TPM | computer cage ]
Question
List one way in which a biometric device might be used in computer and/or network security.
Question
Which of the following would be considered PII? (Choose all that apply.)
[ employee ID | unique password | someone's age | person's name | corporate user ID ]
Question
Which two of the following should be required if a company has an outside company that destroys sensitive corporate documents? (Choose two.)
[ tracking module | certificate of destruction | privacy filter | AUP | proof of incineration | multifactor authentication ]
Question
Which security technology would be used to have secure data communication with a corporate network across the Internet? [ TPM | VPN | DLP | email filtering ]
Question
Where would the number and type of characters required for a corporate password be documented?

A)In a log file
B)In the CIO folder
C)In a locked cabinet in an offsite facility
D)In the security policy
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 18: Computer and Network Security
1
In what instance would an AUP be relevant?

A)When someone walks by and sees someone with child pornography opened in a browser
B)When someone accesses a network wiring closet and the event is logged
C)When someone has requested access to a shared folder or rights to a particular part of a system
D)When someone has requested badge/key access to the network operations center
C
2
Which of the following would help with tailgating?
[ mantrap | password security | TPM | computer cage ]
Mantrap
3
Which of the following would help with shoulder surfing?
[ mantrap | password security | tracking module | privacy filter ]
Privacy filter
4
What does LoJack do?

A)Generates and stores cryptographic keys
B)Allows locating and possibly controlling a lost or remote mobile device
C)Provides unrestricted access to BIOS/UEFI options
D)Provides security rules specific to email
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Which security technology would be used to protect an organization against an external digital threat? [ mantrap | TPM | firewall | computer cage ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
List one benefit of an electronic key card.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
What is the practice of an unauthorized person entering a space behind an authorized person called?
[ tailgating | phishing | spear phishing | tracking ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Which security threat poses as a legitimate source because it contains personal information that is legitimate? [ Trojan virus | rootkit | botnet | spear phishing ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
Which security threat does not allow user access to a device until the user pays money?
[ Trojan | piracy | malware | ransomware ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
In one or more sentences, describe the difference between an IDS and IPS using good grammar, capitalization, and punctuation.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
What is used to gain administrator access to a Linux operating system?
[ Trojan virus | botnet | spyware | rootkit ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Someone buys a cheap game at a store and then gives the same game to the neighbor to install.Which term describes this act? [ shoulder surfing | piracy | malware | ransomware ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which security technology would help with spam?
[ multifactor authentication | VPN | firewall | email filtering ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Which type of license would be used for Microsoft Office licensed to all desktops in a college?
[ open source | personal | licensed | commercial ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Which security measure might help locate a lost mobile device?
[ mantrap | tracking module | TPM | computer cage ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
List one way in which a biometric device might be used in computer and/or network security.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following would be considered PII? (Choose all that apply.)
[ employee ID | unique password | someone's age | person's name | corporate user ID ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Which two of the following should be required if a company has an outside company that destroys sensitive corporate documents? (Choose two.)
[ tracking module | certificate of destruction | privacy filter | AUP | proof of incineration | multifactor authentication ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which security technology would be used to have secure data communication with a corporate network across the Internet? [ TPM | VPN | DLP | email filtering ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Where would the number and type of characters required for a corporate password be documented?

A)In a log file
B)In the CIO folder
C)In a locked cabinet in an offsite facility
D)In the security policy
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.