cti security final
Credit score reports cost about ____.
$10
Bluetooth's rate of transmission is ____ Mbps
1
It is estimated that over 100 trillion e-mails are sent annually, increasing at a rate of ____ percent each year.
10
IEEE ____ combines the best features of 802.11b and 802.11a and is still used today
802.11g
____ policy defines requirements for using cryptography.
Acceptable encryption
___ is the process of setting a user's account to expire.
Account expiration
____ represent a specific way of implementing ActiveX and are sometimes called ActiveX applications
ActiveX controls
___ are spiked collars that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing; serves as both a practical and visual deterrent.
Anti-climb collars
___ is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
Anti-climb paint
____ cryptography uses two keys.
Asymmetric
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
Bluesnarfing
____ attacks are often the means by which an attacker will perform an arbitrary code execution.
Buffer overflow
___ is defined as the ability of an organization to maintain its operations and services in the face of a disruptive event.
Business continuity
___ policy creates standards for using corporate e-mail.
___ policy helps employees determine what information sent or received by e-mail should be retained and for how long
E-mail retention
____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
GLBA
____ policy is a Microsoft Windows feature that provides centralized management and configuration of computers and remote users using the Microsoft directory service Active Directory (AD).
Group
Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
HIPAA
In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.
IEEE
The current version of IMAP is ____.
IMAP4
____ involves using someone's personal information, such as a Social Security number, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating.
Identity theft
___ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its level of security.
Information sensitivity
A(n) ____ is a business from which users purchase Internet access.
Internet Service Provider
____ is a complete programming language that can be used to create stand-alone applications
Java
A(n) ____ address is a unique hardware number that is "burned in" to each wireless network interface card adapter.
MAC
___ locks lock the door from the inside but cannot be unlocked from the outside.
Patio
____ is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise, in an attempt to trick the user into surrendering private information.
Phishing
____ may reveal the true level of security within the organization.
Policy manuals
___ are independently rotating large cups (in diameter of 5 inches or 115 millimeters) affixed to the top of a fence to prevent the hands of intruders from gripping the top of a fence to climb over it.
Roller barriers
The ____ in a Wi-Fi network serves as the network name identifier.
SSID
When creating passwords, the most important principle is that length is more important than complexity
True
As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security.
Wi-Fi Protected Setup (WPS)
Many attackers create a direct ____ network, a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop.
ad hoc
Spyware usually performs one of the following functions on a user's computer: ____, collecting personal information, or changing computer configurations.
advertising
E-mail ____ are documents that are connected to an e-mail message, such as word processing documents, spreadsheets, or pictures.
attachments
On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time.
auto-lock
There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.
bluetooth
A ____ is created when hundreds, thousands, or even tens of thousands of zombie computers are manipulated under remote control.
botnet
Instructions written in HTML code specify how a local computer's Web ____ should display the words, pictures, and other elements on a user's screen.
browser
"____" involves breaking into a car's electronic system.
car hacking
The ____ team is contacted whenever digital evidence needs to be preserved and serve as first responders.
computer forensics response
One of the best defenses against attacks is to create ____ on a regular basis.
data backups
Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. This is known as ____.
denying services
A ____ attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file.
dictionary
There is a straightforward and easy solution to securing computers.
false
Web sites use the standard HTTP protocol for sending data through the Internet because this protocol is secure and ensures that an attacker cannot view the contents of the transmission.
false
Whereas tablets are designed for performance, laptops are focused on ease of use
false
Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers.
false
A(n) ____ is a method used by operating systems to store, retrieve, and organize files
file system
____ is the application of science to questions that are of interest to the legal profession
forensics
Residential hardware locks for doors generally fall in ____ categories.
four
A ____ is a collection of suggestions that should be implemented.
guideline
In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.
hacker
A ____ is essentially a duplicate of the organization's main production site and has all the equipment needed for it to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
hot site
___ ensures that information is correct and no unauthorized person or malicious software has altered that data.
integrity
A ____ device is similar to a portable USB hard drive except it has additional ''intelligence'' that allows all devices connected to the computer network to access it.
network attached storage
The best approach to establishing strong security with passwords is to use a ____.
password management tool
Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures
people
A ____ is a document that outlines specific requirements or rules that must be met.
policy
Most encryption for data stored on a laptop uses ____ cryptography.
private key
Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.
protocols
Most e-mail clients contain a ____ that allows the user to read an e-mail message without actually opening it
reading pane
On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen.
remote wipe
A(n) ____ is a written document that states how an organization plans to protect the company's information technology assets.
security policy
The practice called "____" requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.
separation of duties
AV software on a computer must have its ____ files regularly updated by downloads from the Internet.
signature
Grouping individuals and organizations into clusters or groups based on their likes and interests is called ____.
social networking
The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____.
social networking sites
____ look for specific words and block e-mail messages containing those words
spam filters
A botnet consisting of thousands of zombies enables an attacker to send massive amounts of spam. Some botnets can also harvest e-mail addresses. This is known as ____.
spamming
A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.
standard
A(n) ____ account is designed for everyday computing activities and allows for some settings to be modified
standard
A(n) ____ infection injects portions of the code throughout the program's executable code instead of only at the end of the file (any overwritten original code is transferred and stored inside the virus code for proper execution of the host program after the infection).
swiss cheese
On average it takes ____ days for a victim to recover from an attack
ten
Attack tools can initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.
true
Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.
true
Virtually anyone could type in a person's username and pretend to be that person
true
War driving is derived from the term ____.
war dialing
Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.
whole disk