FINAL REVIEW CBS

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is Bluetooth's rate of transmission?

1 Mbps

Which type of web browser enhancement can change browser menus or create additional toolbars?

Add-ons

Which of the following is a risk associated with the use of private data?

Associations with groups.

A ___________________ that is installed on a computer allows the attacker to return at a later time and bypass security settings.

Backdoor

Which of the following is an attack that sends unsolicited messages to Bluetooth-enabled devices?

Bluejacking

There are two major types of wireless networks that are popular today among users. One of these networks is Wi-Fi; what is the other?

Bluetooth

Which of the following is NOT a technology typically used by spyware?

Disk drive formatting software

____________________ involves digging through trash receptacles to find information that can be useful in an attack.

Dumpster Diving

Which technique might an attacker employ to find documents that may reveal the true level of security within an organization?

Dumpster diving

What law contains rules regarding consumer privacy?

Fair and Accurate Credit Transactions Act

IMAP users can't work with email while offline.

False

In a well-run information security program, attacks will never get through security perimeters and local defenses.

False

Malware usually enters a computer system with the user's knowledge.

False

Online data is collected for a number of activities, but not for online purchases.

False

Passwords are still considered a strong defense against attackers.

False

Steganography can only utilize image files to hide data.

False

Whereas tablets are designed for performance, laptops are focused on ease of use.

False

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

GLBA

Which of the following is an advantage of hardware encryption over software encryption?

Hardware encryption is not subject to attacks like software encryption.

Which of the following ensures that information is correct and no unauthorized person or malicious software has altered it?

Integrity

____ is a scripting language that does not create standalone applications.

JavaScript

What security feature can you use to cause a mobile device to be completely locked for a period of time if the passcode is entered incorrectly a number of times?

Lockout period

Which of the following can be described as data that is used to describe the content or structure of the actual data?

Metadata

It is important that action be taken in advance in order to ____________________. This may involve keeping backup copies of important data stored in a safe place.

Minimize losses

Which document identifies individuals within the organization who are in positions of authority?

Organizational charts

Which type of attacks might send an e-mail or display a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information?

Phishing

What is another name for asymmetric cryptography?

Public key cryptography

Which term is best described as individuals who want to attack computers yet who lack the knowledge of computers and networks needed to do so?

Script kiddies

HTTP is based on which larger set of standards for Internet communication?

TCP/IP

Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.

True

FACTA grants consumers the right to request one free credit report from each of the three national credit-reporting firms every 12 months.

True

The Likes indicated by Facebook users can statistically reveal their sexual orientation, drug use, and political beliefs.

True

The weakness of passwords centers on human memory.

True

With blocked top-level domain lists, email from entire countries or regions can be blocked and treated as spam.

True

Which Windows feature provides information to users and obtains their approval before a program can make a change to the computer's settings?

User Account Control

The technical name for a Wi-Fi network

WLAN

A security setting that provides the optimum level of wireless security

WPA2 Personal

The ____ is composed of Internet server computers on networks that provide online information in a specific format.

World Wide Web

A more sophisticated device used in an office setting instead of a wireless router

access point

In an office setting, instead of using a wireless broadband router, a more sophisticated device known as a(n) ____________________ is used.

access point

An attack that sends unsolicited messages to Bluetooth-enabled devices

bluejacking

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection

bluesnarfing

How do attackers today make it difficult to distinguish an attack from legitimate traffic?

by using common Internet protocols

What can an attacker use to divert all mail to their post office box so that the victim is never aware that personal information has been stolen?

change-of-address form

What type of attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file?

dictionary

An AP or another computer that is set up by an attacker designed to mimic the authorized Wi-Fi device

evil twin

___________________ cookies can be used to reinstate regular cookies that a user has deleted or blocked.

flash

In the past, which term was commonly used to refer to a person who uses advanced computer skills to attack computers?

hacker

Which of the following creates a digest and does not create ciphertext that can later be decrypted?

hash alhorithm

Which attacker category might have the objective of retaliation against an employer?

insider

What type of device is inserted between the computer keyboard connection and USB port for the purposes of stealing information?

keylogger

What security feature on a smartphone prevents the device from being used until a passcode is entered?

lock screen

A(n) ___________________ is a series of instructions that can be grouped together as a single command.

macro

How many keys are used in symmetric cryptography?

one

Information contained on devices is protected by three layers: Two of the layers are products and policies and procedures. What is the third layer?

people

Using which Internet security best practice is information not saved by the browser, such as pages that are visited will not be recorded to history or the address bar?

private browsing

What type of malware can, for example, locks up a user's computer and then display a message that purports to come from a law enforcement agency that states the user must pay a fine for illegal activity?

ransomware

Most email clients contain a ____ that allows the user to read an email message without actually opening it.

reading pane

Which of the following is NOT a protection for information that cryptography can provide?

redundancy

Removing the built-in limitations and protections on Google Android devices

rooting

Which type of malware is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?

rootkit

Downloading an app from an unofficial third-party website

sideloading

AV software on a computer must have its ____ files regularly updated by downloads from the Internet.

signature

A(n) ____________________-party cookie is a cookie that was not created by the Web site that attempts to access the cookie.

third

What are the three types of malware that have the primary traits of circulation and/or infection?

viruses, Trojans, and worms

What is a flaw or weakness that allows a threat agent to bypass security?

vulnerability

From what term is war driving derived?

war dialing

A new class of mobile technology consisting of devices that can be worn by the user instead of carried

wearable technology


संबंधित स्टडी सेट्स

SLP- Maternity- pregnancy, labor, and childbirth

View Set

Intro to Supply Chain Management - Chapter 8: Operations Management

View Set

Chapter 11 Teams: Characteristics and Diversity

View Set