Term
A fingerprint reader is an example of which security technology? |
|
Definition
|
|
Term
Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux? |
|
Definition
|
|
Term
Which type of program causes banners and ads to appear on the desktop without any user intervention? |
|
Definition
|
|
Term
Which three suggestions are good security password policies that a company or individual should follow? |
|
Definition
1. Passwords should have an expiration period.
2. Password lockout should be enabled.
3. A mix of letters, numbers, and other characters should be used. |
|
|
Term
What are two examples of malware |
|
Definition
|
|
Term
Which two characteristics describe a worm |
|
Definition
1. Is self-replicating.
2. Travels to new computers without any intervention or knowledge of the user. |
|
|
Term
An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat? |
|
Definition
|
|
Term
Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time? |
|
Definition
1. Place the laptop in a locked security cage designed to store computer equipment. |
|
|
Term
Where is the safest place to store backups? |
|
Definition
|
|
Term
What is the best method for a company to secure data being transmitted across the Internet between remote sites? |
|
Definition
|
|
Term
Which threat to security uses traffic from zombie computers to overwhelm servers? |
|
Definition
|
|
Term
Which two statements are true about username and password standards? |
|
Definition
1. The username naming convention should be kept simple.
2. Rules about password expiration and lockout should be defined. |
|
|
Term
When setting up a new wireless access point, which basic security measure should be taken? |
|
Definition
|
|
Term
What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses? |
|
Definition
Download the latest signature files on a regular basis. |
|
|
Term
Which two items can be downloaded from the Microsoft website to help protect Windows XP? |
|
Definition
1. service packs
2. security patches |
|
|
Term
A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data? |
|
Definition
1. Destroy the hard drives with a hammer. |
|
|
Term
A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? |
|
Definition
|
|
Term
Which best practice should be included in a password protection policy? |
|
Definition
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system. |
|
|
Term
An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented? |
|
Definition
|
|
Term
Which type of software is downloaded onto the computer of a user without the knowledge of the user and causes information about various products to be displayed on the user's monitor? |
|
Definition
|
|
Term
A financial organization is donating computers to a local charity. What is the best method to remove all data from the hard drives in the computers? |
|
Definition
Use data wiping software and delete any hard drive partitions. |
|
|
Term
Which three security storage features are supported by the TPM hardware module? |
|
Definition
1. encryption keys
2. digital certificates
3. passwords |
|
|
Term
An attacker has managed to decode the encrypted messages of a wireless network. The network uses Windows XP and Cisco equipment. The security protocol that is used is WEP with 64-bit encryption. Which action can be recommended to the technician for securing the network? |
|
Definition
Upgrade to the LEAP wireless security protocol. |
|
|
Term
Which statement accurately describes the WEP standard? |
|
Definition
1. WEP is a first generation security standard for wireless communication. |
|
|
Term
A network administrator is looking for a technology that includes both hardware and software authentication. Which technology could the administrator use? |
|
Definition
Trusted Platform Module (TPM) |
|
|
Term
What is the preferred wireless encryption technique if the wireless clients support it? |
|
Definition
|
|
Term
Which type of authentication is evidenced by the use of a small chip on a card that contains user identification data such as bank account numbers and digital signatures? |
|
Definition
|
|