FINAL REVIEW CBS
What is Bluetooth's rate of transmission?
1 Mbps
Which type of web browser enhancement can change browser menus or create additional toolbars?
Add-ons
Which of the following is a risk associated with the use of private data?
Associations with groups.
A ___________________ that is installed on a computer allows the attacker to return at a later time and bypass security settings.
Backdoor
Which of the following is an attack that sends unsolicited messages to Bluetooth-enabled devices?
Bluejacking
There are two major types of wireless networks that are popular today among users. One of these networks is Wi-Fi; what is the other?
Bluetooth
Which of the following is NOT a technology typically used by spyware?
Disk drive formatting software
____________________ involves digging through trash receptacles to find information that can be useful in an attack.
Dumpster Diving
Which technique might an attacker employ to find documents that may reveal the true level of security within an organization?
Dumpster diving
What law contains rules regarding consumer privacy?
Fair and Accurate Credit Transactions Act
IMAP users can't work with email while offline.
False
In a well-run information security program, attacks will never get through security perimeters and local defenses.
False
Malware usually enters a computer system with the user's knowledge.
False
Online data is collected for a number of activities, but not for online purchases.
False
Passwords are still considered a strong defense against attackers.
False
Steganography can only utilize image files to hide data.
False
Whereas tablets are designed for performance, laptops are focused on ease of use.
False
Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?
GLBA
Which of the following is an advantage of hardware encryption over software encryption?
Hardware encryption is not subject to attacks like software encryption.
Which of the following ensures that information is correct and no unauthorized person or malicious software has altered it?
Integrity
____ is a scripting language that does not create standalone applications.
JavaScript
What security feature can you use to cause a mobile device to be completely locked for a period of time if the passcode is entered incorrectly a number of times?
Lockout period
Which of the following can be described as data that is used to describe the content or structure of the actual data?
Metadata
It is important that action be taken in advance in order to ____________________. This may involve keeping backup copies of important data stored in a safe place.
Minimize losses
Which document identifies individuals within the organization who are in positions of authority?
Organizational charts
Which type of attacks might send an e-mail or display a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information?
Phishing
What is another name for asymmetric cryptography?
Public key cryptography
Which term is best described as individuals who want to attack computers yet who lack the knowledge of computers and networks needed to do so?
Script kiddies
HTTP is based on which larger set of standards for Internet communication?
TCP/IP
Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.
True
FACTA grants consumers the right to request one free credit report from each of the three national credit-reporting firms every 12 months.
True
The Likes indicated by Facebook users can statistically reveal their sexual orientation, drug use, and political beliefs.
True
The weakness of passwords centers on human memory.
True
With blocked top-level domain lists, email from entire countries or regions can be blocked and treated as spam.
True
Which Windows feature provides information to users and obtains their approval before a program can make a change to the computer's settings?
User Account Control
The technical name for a Wi-Fi network
WLAN
A security setting that provides the optimum level of wireless security
WPA2 Personal
The ____ is composed of Internet server computers on networks that provide online information in a specific format.
World Wide Web
A more sophisticated device used in an office setting instead of a wireless router
access point
In an office setting, instead of using a wireless broadband router, a more sophisticated device known as a(n) ____________________ is used.
access point
An attack that sends unsolicited messages to Bluetooth-enabled devices
bluejacking
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
bluesnarfing
How do attackers today make it difficult to distinguish an attack from legitimate traffic?
by using common Internet protocols
What can an attacker use to divert all mail to their post office box so that the victim is never aware that personal information has been stolen?
change-of-address form
What type of attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file?
dictionary
An AP or another computer that is set up by an attacker designed to mimic the authorized Wi-Fi device
evil twin
___________________ cookies can be used to reinstate regular cookies that a user has deleted or blocked.
flash
In the past, which term was commonly used to refer to a person who uses advanced computer skills to attack computers?
hacker
Which of the following creates a digest and does not create ciphertext that can later be decrypted?
hash alhorithm
Which attacker category might have the objective of retaliation against an employer?
insider
What type of device is inserted between the computer keyboard connection and USB port for the purposes of stealing information?
keylogger
What security feature on a smartphone prevents the device from being used until a passcode is entered?
lock screen
A(n) ___________________ is a series of instructions that can be grouped together as a single command.
macro
How many keys are used in symmetric cryptography?
one
Information contained on devices is protected by three layers: Two of the layers are products and policies and procedures. What is the third layer?
people
Using which Internet security best practice is information not saved by the browser, such as pages that are visited will not be recorded to history or the address bar?
private browsing
What type of malware can, for example, locks up a user's computer and then display a message that purports to come from a law enforcement agency that states the user must pay a fine for illegal activity?
ransomware
Most email clients contain a ____ that allows the user to read an email message without actually opening it.
reading pane
Which of the following is NOT a protection for information that cryptography can provide?
redundancy
Removing the built-in limitations and protections on Google Android devices
rooting
Which type of malware is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
rootkit
Downloading an app from an unofficial third-party website
sideloading
AV software on a computer must have its ____ files regularly updated by downloads from the Internet.
signature
A(n) ____________________-party cookie is a cookie that was not created by the Web site that attempts to access the cookie.
third
What are the three types of malware that have the primary traits of circulation and/or infection?
viruses, Trojans, and worms
What is a flaw or weakness that allows a threat agent to bypass security?
vulnerability
From what term is war driving derived?
war dialing
A new class of mobile technology consisting of devices that can be worn by the user instead of carried
wearable technology