Course Final Exam

Ace your homework & exams now with Quizwiz!

What is the best way to avoid getting spyware on a machine? A.Install the latest operating system updates B.Install software only from trusted websites C.Install the latest antivirus updates D.Install the latest web browser updates

B

Which of the following firewalls filters traffic based on source and destination data ports and filtering based on connection states? A.Application layer firewall B.Transport layer firewall C.Host-based firewall D.Network address translation firewall E.Network layer firewall

B

You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration? A.Availability B.Confidentiality C.Integrity D.Scalability

B

Which of the following security implementations use biometrics? Choose two correct answers A.Fob B.Voice recognition C.Phone D.Fingerprint E.Credit card

B & D

Which of the following are categories of security measures or controls? Choose three correct answers A. Camera B.Policy and procedure C.Guards D.Technology E.Firewalls F.Awareness, training and education

B, C, F

During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee's behavior ethical or unethical? Ethical Unethical

Ethical

After a data breach, it's important to educate employees, partners and customers on how to prevent future breaches.' Is this statement true or false? True False

True

An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee's behavior ethical or unethical? Ethical Unethical

Unethical

Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website? A.VPN service B.Password manager C.Open authorization D.In-private browsing mode

C

Which of the following are commonly used port scanning applications? Select two correct answers A.Sequence number B.Port number C.Zenmap D.Nmap

C & D

What vulnerability occurs when data is written beyond the memory areas allocated to an application? A.Race conditions B.Non-validated input C.Buffer overflow D.Access control problems E.Weaknesses in security practices

C

An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan? A.Integrity B.Confidentiality C.Scalability D.Availability

D

Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability? A.Buffer overflow B.Weaknesses in security practices C.Race conditions D.Access control problems E.Non-validated input

D

What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group? A.Zombie B.Hacker network C.Crime syndicate D.Botnet

D

Which of the following certifications is aimed at high school and early college students, as well as anyone interested in a career change? A.EC Council Certified Ethical Hacker B.ISACA CSX Cybersecurity Fundamentals C.ISC2 Certified Information Systems Security Professional D.Palo Alto Networks Certified Cybersecurity Associate E.Microsoft Technology Associate Security Fundamentals F.CompTIA Security+

E


Related study sets

Literary Terms for Year One Eng. Lit BA(hons)

View Set

Med Surg 1 Ch45 Adaptive Quizzing

View Set

Give meanings for the following terms

View Set

Chapter 1: Intro to Project Mangement

View Set