cti security final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Credit score reports cost about ____.

$10

Bluetooth's rate of transmission is ____ Mbps

1

It is estimated that over 100 trillion e-mails are sent annually, increasing at a rate of ____ percent each year.

10

IEEE ____ combines the best features of 802.11b and 802.11a and is still used today

802.11g

____ policy defines requirements for using cryptography.

Acceptable encryption

___ is the process of setting a user's account to expire.

Account expiration

____ represent a specific way of implementing ActiveX and are sometimes called ActiveX applications

ActiveX controls

___ are spiked collars that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing; serves as both a practical and visual deterrent.

Anti-climb collars

___ is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.

Anti-climb paint

____ cryptography uses two keys.

Asymmetric

____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

Bluejacking

____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

Bluesnarfing

____ attacks are often the means by which an attacker will perform an arbitrary code execution.

Buffer overflow

___ is defined as the ability of an organization to maintain its operations and services in the face of a disruptive event.

Business continuity

___ policy creates standards for using corporate e-mail.

E-mail

___ policy helps employees determine what information sent or received by e-mail should be retained and for how long

E-mail retention

____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

GLBA

____ policy is a Microsoft Windows feature that provides centralized management and configuration of computers and remote users using the Microsoft directory service Active Directory (AD).

Group

Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

HIPAA

In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.

IEEE

The current version of IMAP is ____.

IMAP4

____ involves using someone's personal information, such as a Social Security number, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating.

Identity theft

___ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its level of security.

Information sensitivity

A(n) ____ is a business from which users purchase Internet access.

Internet Service Provider

____ is a complete programming language that can be used to create stand-alone applications

Java

A(n) ____ address is a unique hardware number that is "burned in" to each wireless network interface card adapter.

MAC

___ locks lock the door from the inside but cannot be unlocked from the outside.

Patio

____ is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise, in an attempt to trick the user into surrendering private information.

Phishing

____ may reveal the true level of security within the organization.

Policy manuals

___ are independently rotating large cups (in diameter of 5 inches or 115 millimeters) affixed to the top of a fence to prevent the hands of intruders from gripping the top of a fence to climb over it.

Roller barriers

The ____ in a Wi-Fi network serves as the network name identifier.

SSID

When creating passwords, the most important principle is that length is more important than complexity

True

As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security.

Wi-Fi Protected Setup (WPS)

Many attackers create a direct ____ network, a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop.

ad hoc

Spyware usually performs one of the following functions on a user's computer: ____, collecting personal information, or changing computer configurations.

advertising

E-mail ____ are documents that are connected to an e-mail message, such as word processing documents, spreadsheets, or pictures.

attachments

On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time.

auto-lock

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.

bluetooth

A ____ is created when hundreds, thousands, or even tens of thousands of zombie computers are manipulated under remote control.

botnet

Instructions written in HTML code specify how a local computer's Web ____ should display the words, pictures, and other elements on a user's screen.

browser

"____" involves breaking into a car's electronic system.

car hacking

The ____ team is contacted whenever digital evidence needs to be preserved and serve as first responders.

computer forensics response

One of the best defenses against attacks is to create ____ on a regular basis.

data backups

Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. This is known as ____.

denying services

A ____ attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file.

dictionary

There is a straightforward and easy solution to securing computers.

false

Web sites use the standard HTTP protocol for sending data through the Internet because this protocol is secure and ensures that an attacker cannot view the contents of the transmission.

false

Whereas tablets are designed for performance, laptops are focused on ease of use

false

Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers.

false

A(n) ____ is a method used by operating systems to store, retrieve, and organize files

file system

____ is the application of science to questions that are of interest to the legal profession

forensics

Residential hardware locks for doors generally fall in ____ categories.

four

A ____ is a collection of suggestions that should be implemented.

guideline

In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.

hacker

A ____ is essentially a duplicate of the organization's main production site and has all the equipment needed for it to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.

hot site

___ ensures that information is correct and no unauthorized person or malicious software has altered that data.

integrity

A ____ device is similar to a portable USB hard drive except it has additional ''intelligence'' that allows all devices connected to the computer network to access it.

network attached storage

The best approach to establishing strong security with passwords is to use a ____.

password management tool

Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures

people

A ____ is a document that outlines specific requirements or rules that must be met.

policy

Most encryption for data stored on a laptop uses ____ cryptography.

private key

Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.

protocols

Most e-mail clients contain a ____ that allows the user to read an e-mail message without actually opening it

reading pane

On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen.

remote wipe

A(n) ____ is a written document that states how an organization plans to protect the company's information technology assets.

security policy

The practice called "____" requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.

separation of duties

AV software on a computer must have its ____ files regularly updated by downloads from the Internet.

signature

Grouping individuals and organizations into clusters or groups based on their likes and interests is called ____.

social networking

The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____.

social networking sites

____ look for specific words and block e-mail messages containing those words

spam filters

A botnet consisting of thousands of zombies enables an attacker to send massive amounts of spam. Some botnets can also harvest e-mail addresses. This is known as ____.

spamming

A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.

standard

A(n) ____ account is designed for everyday computing activities and allows for some settings to be modified

standard

A(n) ____ infection injects portions of the code throughout the program's executable code instead of only at the end of the file (any overwritten original code is transferred and stored inside the virus code for proper execution of the host program after the infection).

swiss cheese

On average it takes ____ days for a victim to recover from an attack

ten

Attack tools can initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.

true

Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.

true

Virtually anyone could type in a person's username and pretend to be that person

true

War driving is derived from the term ____.

war dialing

Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.

whole disk


Ensembles d'études connexes

Types of health and dental insurance

View Set

Life/Health - A.D. Banker - Chapter 12

View Set

Chapter 23 Behavioral and Psychiatric Emergencies and Suicide Scene Scenario Questions

View Set