Filters
Question type

Study Flashcards

What has occurred when a user accesses resources in an unauthorized way?


A) Environmental threat
B) Hardware failure
C) Unauthorized access
D) Virus attack

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

In a(n) _______________ attach, an attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those systems.

Correct Answer

verifed

verified

man-in-the-middle (M...

View Answer

What is the difference between a man-in-the-middle (MITM) attack and session hijacking?

Correct Answer

verifed

verified

A man-in-the-middle (MITM) attack taps i...

View Answer

What is a rootkit?

Correct Answer

verifed

verified

A rootkit is a program that ta...

View Answer

_______________ is a form of malware that encrypts all the data it can get access to on a system, and then asks for money to decrypt your data.

Correct Answer

verifed

verified

How can a technician identify an action or content as prohibited?

Correct Answer

verifed

verified

The Acceptable Use Policy defi...

View Answer

What can be used to create entries in the Security Log whenever a user logs on?


A) Event auditing
B) Object access auditing
C) Event tracking
D) Success logging

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Define social engineering.

Correct Answer

verifed

verified

Social engineering is the proc...

View Answer

What encryption mechanism can be used for WAN connections (such as T1s and Metro Ethernet) and VPNs?

Correct Answer

verifed

verified

IP Security (IPSec) is an encr...

View Answer

A(n) _______________ is an attack on a vulnerability that wasn't already known to software developers.

Correct Answer

verifed

verified

zero-day a...

View Answer

Security _______________ are devices that store some unique information that the user carries on his or her person.

Correct Answer

verifed

verified

The list of virus signatures that your antivirus program can recognize is called the _______________.

Correct Answer

verifed

verified

Antimalware programs can passively monitor your computer's activity.What are they called when operating in this mode?


A) Grayware
B) Spyware
C) Virus shields
D) Virus swords

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What is encryption on a network?

Correct Answer

verifed

verified

Encryption is the pr...

View Answer

A device that can prove who you are based on your fingerprint is known as a(n) _______________ device.

Correct Answer

verifed

verified

Those who configure permissions to accounts must follow the principle of _______________.

Correct Answer

verifed

verified

In the context of viruses, what is a signature?

Correct Answer

verifed

verified

A signatur...

View Answer

What is a checksum?

Correct Answer

verifed

verified

A checksum is a number that is...

View Answer

A(n) _______________ is a device or software (or combination of both) used to protect an internal network from unauthorized access from the Internet.

Correct Answer

verifed

verified

Some free anti-malware applications are actually malware and are commonly referred to as _______________.

Correct Answer

verifed

verified

Showing 61 - 80 of 89

Related Exams

Show Answer