Security Plus Chapter 7-12 Practice Final
50%
Computer room humidity should ideally be kept at what percent?
FERPA
Which of the following dictates that educational institutions may not release information to unauthorized parties without the express permission of the student?
SPAM
Which of the following is a slang term for unwanted commercial e-mail?
Escort visitors at all times
Which of the following is a solution that addresses physical security?
Spoofing
Which of the following is a type of attack that occurs when an attacker pretends to be a legitimate client, using information it has gained from a legitimate client (like it's IP address).
Restricted
A digital file containg a comany's proprietary processes and strategic information would be classified as which of the following?
Buffer overflow
A programmer that fails to check the length of input before processing leaves the code vulnerable to what form of common attack?
Limited Distribution
An End User License Agreement (EULA) for software would typically be considered what classification of information?
pop-up blocker
As you browse the Internet, you notice that when you go to some sites, multiple additional windows are opened automatically. Many of these windows contain advertisements for products that are inappropriate for your family to view.Which tool can you implement to prevent these windows from showing?
Crpytographers
Individuals who specialize in the making of codes are known as which of the following?
Physical
Locking the door(s) to the server room involves what kind of security?
Perimeter
On the outer edge of physical security is the first barrier to entry. This barrier is known as which of the following?
Substitution cipher
What kind of cryptographic method replaces one character with another from a "match-up list" to produce the ciphertext?
X.509
Which "X." standard defines certificate formats and fields for public keys?
PKCS#5
Which PKCS standard is the standard for password-based cryptography?
Retrovirus
Which type of virus attacks or bypasses the antivirus software installed on a computer?
NSA
Which U.S. government agency is responsible for creating and breaking codes?
Archival
Which of the following is NOT a goal of information security?
NIST
Which U.S. government agency publishes lists of known vulnerabilities in operating systems?
Social Engineering
Which kind of security attack is a result of the trusting nature of human beings?
3DS
Which of the following is NOT an asymmetric encryption algorithm?
Deploy a mantrap
Which of the following can be used to stop piggybacking that has been occurring at a front entrance where employees should swipe their smart cards to gain entry?
HIPPA
Which U.S. regulation dictates the standards for storage, use, and transmission of personal medical information?
DoS
You are the administrator of a website. You are working when you suddenly notice web server and network utilization spike to 100% and it stays there for several minutes. Network users start reporting "Server not available" errors. You may have been the victim of what kind of attack?
Drilling a hole into the flash memory component of the USB drives and then discarding them
Your company is getting rid of old 1GB USB flash drives that contain sensitive data. What is the proper method of disposing of this type of storage media?
Type C
Which fire extinguisher type is the best to be used on computer equipment in the case of a computer fire?
Brute Force
Which method of attack against a password happens when an attacker tries many different combinations of alphanumeric characters until successful?
Brute Force
Which method of code breaking tries every possible combination of characters in an attempt to "guess" the password or key?
SHA
Which of the following is a hashing algorithm?
XSS
Which of the following is an attack that inject malicious scripts into Web pages to redirect users to fake websites or gather personal information?
System Failure
Which of the following is an internal threat?
XA
Which of the following is not a component of Public Key Infrastructure (PKI)?
Database Servers
Which of the following is primarily subject to an SQL injection attack?
man trap
Which of the following is the term for an area in a building where access is individually monitored and controlled?
Faraday cage
Which of the following is used to provide EMI & RFI shielding for an entire room of computer or electronic equipment (also used to prevent eavesdropping)?
Gramm-Leach-Bliley Act
Which of the following prohibits banks from releasing information to nonaffiliated third parties without permission?
Biometric
Which of the following security device uses some biological characteristic of human beings to uniquely identify a person for authentication?
ESD is much more likely to occur when the relative humidity is above 50%
Which of the following statements about electrostatic discharge (ESD) is not correct?
A virus requires a user action to propagate & infect other host systems.
Which of the following statements is true?
Information classifications policies
Which type of policy determines if information is secret, top-secret, or public?