Computer User Support - Chapter 14a Quiz Practice (CNET-102)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge. Which of the following security measures would you MOST likely implement to keep this from happening in the future?

Access control vestibule

Which of the following is an important aspect of evidence gathering in response to a security incident?

Back up all log files and audit trails.

Which Windows feature can you use to encrypt a hard drive volume?

BitLocker

You have been hired to help assess the security of your client's organization. During your assessment, you have found a rogue wireless access point that is configured to look identical to the legitimate wireless network. Which of the following attacks was MOST likely being carried out?

Evil twin attack

You have accepted a position working in a local hospital's IT department. Which of the following government regulations would be the most important for the hospital to be in compliance with?

HIPAA

Which of the following statements is true regarding hard tokens?

Hard tokens provide a higher level of security.

Which of the following door locks provides authentication to a specific lock over a Bluetooth connection?

Key fob

Which of the following can be paired with a motion sensor to improve security?

Lights

Which of the following authentication combinations is an example of multi-factor authentication?

PIN and authentication app

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

Phishing

During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display?

Privacy filter

You are assisting the security administrator and discover that a user was logged in to their workstation after hours. After further investigation, you discover that the user's account was compromised, and someone used the account to steal sensitive data. Which of the following could have BEST prevented this from happening?

Restrict the user's login times to work hours only.

A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence?

Shutting down the system

You are working as a junior network technician at the local hospital. The security administrator has just finished rolling out a new security policy that requires users to log in to workstations using a fingerprint scanner. Which authentication category does this fall under?

Something you are

A security incident is currently occurring on your company's network. You discover that the attack involves a computer system that is attached to the network. You are unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take FIRST?

Stop the attack and contain the damage by disconnecting the system from the network.

Which of the following BEST describes authorization?

The resources that a user can access.

You have five salespeople who work out of your office and who frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection method to address your concerns?

Use cable locks to chain the laptops to the desks.

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred?

Vishing

Which of the following attacks exploits a vulnerability in software that has not been discovered by the developer?

Zero-day attack

Which of the following are examples of a strong password? (Select two.)

il0ve2EatIceCr3am! I love the Linux P3ngu!n Tux


Kaugnay na mga set ng pag-aaral

Chapter 14 micro- Innate Immunity

View Set

ch 4 4.6 tissue injury and aging

View Set

Macro Economics 2021—Chapters 6&7

View Set

Mother Baby Week 4 study questions

View Set

NUR 2144 Pharmacology II Chapter 46: Antianginal Agents

View Set

Chapter 3: Types of Policies and Riders (In-Course Quiz)

View Set