1102 Security q1 Flashcards

1
Q

Which of the following is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a risk associated with using a web browser password manager?

A

Signing in with the browser password gives a hacker control over all passwords stored on the browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following stores user accounts, groups, and their assigned rights and permissions?

A

Domain Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following identifies the network name on a wireless network?

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

While Advanced Encryption Standard (AES) keys can be either 128, 192, or 256 bits in length, AES encrypts everything in one-size data chunks.

Which of the following is the size of those AES data chunks?

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In which of the following security attacks does the hacker intercept session cookies in order to access the victim’s account?

A

Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.)

A

Medical sensors

Smartwatches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following Windows 11 options lets you associate your local user account with an online Microsoft account?

A

Manage my accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following hard drive destruction methods runs the risk of releasing toxic by-products?

A

Incineration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are establishing a new security policy for user authentication and want to implement multi-factor authentication

A

Fingerprint and one-time code text message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff who work in the same building.

Due to the sensitive nature of these document, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically given the UNC path to the files.

Which of the following would MOST likely fulfil Ben’s file management requirements?

A

Administrative share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your computer has a single NTFS partition that is used for the C: drive with the folders below.

C:\Confidential

C:\PublicReports

In the C:\Confidential folder, you edit the properties for the two files below and assign the Deny Read permission to the Users group.

Reports.doc

Costs.doc

The C:\PublicReports folder allows the Full Control permission for the Users group. There are no other permissions assigned except the default permissions. You then take the following actions. You:

Move Reports.doc from C:\Confidential to C:\PublicReports.

Copy Costs.doc from C:\Confidential to C:\PublicReports.

Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

A

Deny Read for Reports.doc and Allow Full Control for Costs.doc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which file attribute identifies the file as having been modified since the last backup?

A

Archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following authentication combinations is an example of multi-factor authentication?

A

PIN and authentication app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Windows component prompts the user for credentials or permissions to protect against unauthorized activities, such as an unintended software installation?

A

User Account Control (UAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Match each authentication protocol on the left with its unique characteristic on the right. (Each protocol may be used more than once).

Sends a user’s credentials over UDP

A

Remote Authentication Dial-In Service (RADIUS)

17
Q

Match each authentication protocol on the left with its unique characteristic on the right. (Each protocol may be used more than once).

Sends a user’s credentials over TCP

A

Terminal Access Controller Access-Control System (TACACS+)

18
Q

Match each authentication protocol on the left with its unique characteristic on the right. (Each protocol may be used more than once).

Is a key component of Windows Active Directory

A

Kerberos

19
Q

Match each authentication protocol on the left with its unique characteristic on the right. (Each protocol may be used more than once).

Provides a trusted Key Distribution Center (KDC)

A

Kerberos

20
Q

Match each authentication protocol on the left with its unique characteristic on the right. (Each protocol may be used more than once).

Only encrypts the password

A

Remote Authentication Dial-In Service (RADIUS)

21
Q

You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference.

A

The file will no longer be encrypted.