Deck 18: Computer and Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 18: Computer and Network Security
1
In what instance would an AUP be relevant?
A)When someone walks by and sees someone with child pornography opened in a browser
B)When someone accesses a network wiring closet and the event is logged
C)When someone has requested access to a shared folder or rights to a particular part of a system
D)When someone has requested badge/key access to the network operations center
A)When someone walks by and sees someone with child pornography opened in a browser
B)When someone accesses a network wiring closet and the event is logged
C)When someone has requested access to a shared folder or rights to a particular part of a system
D)When someone has requested badge/key access to the network operations center
C
2
Which of the following would help with tailgating?
[ mantrap | password security | TPM | computer cage ]
[ mantrap | password security | TPM | computer cage ]
Mantrap
3
Which of the following would help with shoulder surfing?
[ mantrap | password security | tracking module | privacy filter ]
[ mantrap | password security | tracking module | privacy filter ]
Privacy filter
4
What does LoJack do?
A)Generates and stores cryptographic keys
B)Allows locating and possibly controlling a lost or remote mobile device
C)Provides unrestricted access to BIOS/UEFI options
D)Provides security rules specific to email
A)Generates and stores cryptographic keys
B)Allows locating and possibly controlling a lost or remote mobile device
C)Provides unrestricted access to BIOS/UEFI options
D)Provides security rules specific to email
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Which security technology would be used to protect an organization against an external digital threat? [ mantrap | TPM | firewall | computer cage ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
List one benefit of an electronic key card.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
What is the practice of an unauthorized person entering a space behind an authorized person called?
[ tailgating | phishing | spear phishing | tracking ]
[ tailgating | phishing | spear phishing | tracking ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Which security threat poses as a legitimate source because it contains personal information that is legitimate? [ Trojan virus | rootkit | botnet | spear phishing ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
Which security threat does not allow user access to a device until the user pays money?
[ Trojan | piracy | malware | ransomware ]
[ Trojan | piracy | malware | ransomware ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
In one or more sentences, describe the difference between an IDS and IPS using good grammar, capitalization, and punctuation.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
What is used to gain administrator access to a Linux operating system?
[ Trojan virus | botnet | spyware | rootkit ]
[ Trojan virus | botnet | spyware | rootkit ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Someone buys a cheap game at a store and then gives the same game to the neighbor to install.Which term describes this act? [ shoulder surfing | piracy | malware | ransomware ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which security technology would help with spam?
[ multifactor authentication | VPN | firewall | email filtering ]
[ multifactor authentication | VPN | firewall | email filtering ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Which type of license would be used for Microsoft Office licensed to all desktops in a college?
[ open source | personal | licensed | commercial ]
[ open source | personal | licensed | commercial ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Which security measure might help locate a lost mobile device?
[ mantrap | tracking module | TPM | computer cage ]
[ mantrap | tracking module | TPM | computer cage ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
List one way in which a biometric device might be used in computer and/or network security.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following would be considered PII? (Choose all that apply.)
[ employee ID | unique password | someone's age | person's name | corporate user ID ]
[ employee ID | unique password | someone's age | person's name | corporate user ID ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Which two of the following should be required if a company has an outside company that destroys sensitive corporate documents? (Choose two.)
[ tracking module | certificate of destruction | privacy filter | AUP | proof of incineration | multifactor authentication ]
[ tracking module | certificate of destruction | privacy filter | AUP | proof of incineration | multifactor authentication ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which security technology would be used to have secure data communication with a corporate network across the Internet? [ TPM | VPN | DLP | email filtering ]
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Where would the number and type of characters required for a corporate password be documented?
A)In a log file
B)In the CIO folder
C)In a locked cabinet in an offsite facility
D)In the security policy
A)In a log file
B)In the CIO folder
C)In a locked cabinet in an offsite facility
D)In the security policy
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck