Chapter 10 - Security Best Practices Review Questions
Install a hardware lock and Enable encryption.
Because of a recent string of thefts in your office, you need to harden your local system. What two actions are most appropriate for your situation? (Choose two.) Install a hardware lock. Disable unused services. Install anti-malware. Enable encryption.
HTTPS:// (Secure websites start with HTTPS://. Also tell her to look for the lock symbol nearby)
Claire, a co-worker, is browsing the Internet and wants to know whether it's safe to enter her credit card information into a website. What do you tell her to look for? HTTPS:// HTTP:// SSL:// TLS://
security risk
Enabling autofill and accepting all cookies can increase your ________.
personally identifiable information (PII)
PII is an acronym for what term?
web browser
Plugins, toolbars, and extensions can add functionality to your _________.
Enforce password policies. and Develop written policies and procedures.
The managers at your company have decided to implement stricter security policies on the company's local network. Which of the following should they do? (Choose two.) Enforce password policies. Develop written policies and procedures. Disable host firewalls. Enable HTTPS on the corporate web server.
Screensaver password
What option can you configure on your workstation to increase security when you leave your desk? File encryption Multifactor authentication Single sign-on Screensaver password
autofill
When you begin to type your information into an online form, ____________ will populate more of it (whatever it has stored) for you.
Closing untrusted source warnings
Which of the following actions is not considered a web browsing best practice? Limiting the use of PII Disabling autofill Closing untrusted source warnings Updating plugins and toolbars
Long and Uses symbols, numbers, and letters
Which of the following are considered characteristics of a strong password? (Choose two.) Long Uses patterns Uses symbols, numbers, and letters Contains PII
They should be updated to the newest versions.
Which of the following statements is true regarding web browser plugins, toolbars, and extensions? They should be updated to the newest versions. They are dangerous and should be deleted. They will be detected and removed by antivirus software. They only function in Microsoft Edge or Internet Explorer.
Financial information and Customer information
Which of the following types of data should be considered confidential and handled appropriately? (Choose two.) Financial information Social networking site Customer information Contact information
Software firewall
Which type of software will help protect your computer from malicious network traffic? Software firewall Password complexity tool Antispyware Antivirus
security policies, Password
Written policies and procedures should be established for enabling stricter __________. _______ policies that enforce length, complexity, expiration, and limited reuse are good to implement.
Shoulder surfing Keyloggers Unsecured wireless network
You are in a library that has free computers to use for Internet browsing. Which of the following should you possibly be concerned about? Shoulder surfing Keyloggers Unsecured wireless network A and B A, B, and C
Enable autofill
You are using Google Chrome, and you want to ensure that when you type in your first name to a web page, all of your other information fills in the fields for you. What should you do? Enable cookies. Enable cache. Enable Incognito. Enable autofill.
They logged on with your username and password.
You enabled file encryption on your local computer. While you were on vacation, one of your co-workers managed to get onto your computer and share your important files with other users. How did they do this? They logged on and disabled encryption. They used the Disk Recovery tool to access the encrypted files. All users logging into the system have access to encrypted files. They logged on with your username and password.
Change default passwords on systems. and Do not reuse the same password after you are required to change it.
You have been asked to give training on network security. For your section on password management, which options should you recommend to users? (Choose two.) Do not use complex passwords because they are easy to forget. Change default passwords on systems. Use the same password on multiple systems so that they are easy to remember. Do not reuse the same password after you are required to change it.
Bluetooth and NFC
You have just landed at an airport and have an unexpected six-hour layover. You want to use your smartphone to get some work done. What should you disable as a precautionary device-hardening measure to help prevent potential attacks? (Choose two.) Autofill Bluetooth NFC FFC
VPN (A virtual private network is a secured, encrypted connection between two specific computers.)
You have remotely logged into your corporate network. Which of the following is used to ensure encryption of data in transit between your laptop and corporate servers? HTTPS Email encryption VPN Host firewall
Antivirus
You just read an article about an Internet worm recently causing problems. What type of software should you install to protect yourself from this worm? Software firewall Antispyware Antivirus Antispam
Call Sara to see if she sent you the email.
You receive an email in your inbox from your friend Sara. The title of the email is "This is so cool!" and inside the email is an attachment with an .exe extension. What should you do? Delete the email. Click the attachment. Run virus scan; then click the attachment. Call Sara to see if she sent you the email.
Upgrade your browser to the newest version. and Install an antivirus package.
You recently received a new workstation and need to secure it properly before browsing the Internet. Which actions should you take? (Choose two.) Enable autofill. Enable acceptance of cookies. Upgrade your browser to the newest version. Install an antivirus package.
Autofill
Your co-worker Rachel has recently discovered that when she starts typing her name into a field in a web browser, her whole name appears as well as her address in the appropriate boxes. What is this due to? Adware infection Single sign-on Suspicious hyperlinks Autofill
Guest
Your manager just got a new workstation. He wants to know which user accounts he should disable to increase security. What should you tell him to disable? Guest Users Power Users Administrator
Security best practices
_________ include limiting the use of personally identifiable information; disabling autofill; and updating plugins, toolbars, and extensions.
Autofill
_________ is the name of the service that remembers your personal information.
Antivirus software
_________ programs protect against worms and Trojan horses.
Software firewalls
___________ can prevent malicious network traffic but do not recognize viruses or worms.
Shoulder surfing
___________, keyloggers, and unsecured wireless networks are all potential security risks associated with public workstations.
Antispyware, antivirus
_____________ and _____________ software packages are good, but they protect against malicious programs.
Antivirus software, firewalls
______________ programs protect against worms and Trojan horses. Software ___________ can prevent malicious network traffic but do not recognize viruses or worms.
software firewall
A _______ protects your computer against malicious network traffic. Antispyware and antivirus software packages are good, but they protect against malicious programs.
virtual private network (VPN)
A ________ is a secured, encrypted connection between two computers. When logging into a corporate network, VPNs are often used to secure communications.
software firewall
A __________ protects your computer against malicious network traffic.
screensaver password
A __________ will require someone to enter your password to gain access to the computer.
Autofill
A feature in a browser that automatically populates your information in the right fields when you start entering any of the information is called what?