Security Plus Chapter 7-12 Practice Final

Ace your homework & exams now with Quizwiz!

50%

Computer room humidity should ideally be kept at what percent?

FERPA

Which of the following dictates that educational institutions may not release information to unauthorized parties without the express permission of the student?

SPAM

Which of the following is a slang term for unwanted commercial e-mail?

Escort visitors at all times

Which of the following is a solution that addresses physical security?

Spoofing

Which of the following is a type of attack that occurs when an attacker pretends to be a legitimate client, using information it has gained from a legitimate client (like it's IP address).

Restricted

A digital file containg a comany's proprietary processes and strategic information would be classified as which of the following?

Buffer overflow

A programmer that fails to check the length of input before processing leaves the code vulnerable to what form of common attack?

Limited Distribution

An End User License Agreement (EULA) for software would typically be considered what classification of information?

pop-up blocker

As you browse the Internet, you notice that when you go to some sites, multiple additional windows are opened automatically. Many of these windows contain advertisements for products that are inappropriate for your family to view.Which tool can you implement to prevent these windows from showing?

Crpytographers

Individuals who specialize in the making of codes are known as which of the following?

Physical

Locking the door(s) to the server room involves what kind of security?

Perimeter

On the outer edge of physical security is the first barrier to entry. This barrier is known as which of the following?

Substitution cipher

What kind of cryptographic method replaces one character with another from a "match-up list" to produce the ciphertext?

X.509

Which "X." standard defines certificate formats and fields for public keys?

PKCS#5

Which PKCS standard is the standard for password-based cryptography?

Retrovirus

Which type of virus attacks or bypasses the antivirus software installed on a computer?

NSA

Which U.S. government agency is responsible for creating and breaking codes?

Archival

Which of the following is NOT a goal of information security?

NIST

Which U.S. government agency publishes lists of known vulnerabilities in operating systems?

Social Engineering

Which kind of security attack is a result of the trusting nature of human beings?

3DS

Which of the following is NOT an asymmetric encryption algorithm?

Deploy a mantrap

Which of the following can be used to stop piggybacking that has been occurring at a front entrance where employees should swipe their smart cards to gain entry?

HIPPA

Which U.S. regulation dictates the standards for storage, use, and transmission of personal medical information?

DoS

You are the administrator of a website. You are working when you suddenly notice web server and network utilization spike to 100% and it stays there for several minutes. Network users start reporting "Server not available" errors. You may have been the victim of what kind of attack?

Drilling a hole into the flash memory component of the USB drives and then discarding them

Your company is getting rid of old 1GB USB flash drives that contain sensitive data. What is the proper method of disposing of this type of storage media?

Type C

Which fire extinguisher type is the best to be used on computer equipment in the case of a computer fire?

Brute Force

Which method of attack against a password happens when an attacker tries many different combinations of alphanumeric characters until successful?

Brute Force

Which method of code breaking tries every possible combination of characters in an attempt to "guess" the password or key?

SHA

Which of the following is a hashing algorithm?

XSS

Which of the following is an attack that inject malicious scripts into Web pages to redirect users to fake websites or gather personal information?

System Failure

Which of the following is an internal threat?

XA

Which of the following is not a component of Public Key Infrastructure (PKI)?

Database Servers

Which of the following is primarily subject to an SQL injection attack?

man trap

Which of the following is the term for an area in a building where access is individually monitored and controlled?

Faraday cage

Which of the following is used to provide EMI & RFI shielding for an entire room of computer or electronic equipment (also used to prevent eavesdropping)?

Gramm-Leach-Bliley Act

Which of the following prohibits banks from releasing information to nonaffiliated third parties without permission?

Biometric

Which of the following security device uses some biological characteristic of human beings to uniquely identify a person for authentication?

ESD is much more likely to occur when the relative humidity is above 50%

Which of the following statements about electrostatic discharge (ESD) is not correct?

A virus requires a user action to propagate & infect other host systems.

Which of the following statements is true?

Information classifications policies

Which type of policy determines if information is secret, top-secret, or public?


Related study sets

Basic Microsoft Internet Explorer troubleshooting

View Set

Chapter 13: Capacity and Legality

View Set

Residential and Institutional Environment Part 2 (LEHS Review Guide Test 5) (Reference Salvato)

View Set