Chapter 9 Review Questions Flashcards

1
Q

Which of the following are activities that a hacker might attempt?

A. Stealing usernames and passwords 
B. Modifying website content 
C. Disrupting network communications 
D. Analyzing network traffic 
E. All of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have invented a new toy that will be the most popular toy for children this year. What type of intellectual property protection should you get?

A. Trademark
B. Copyright
C. Patent
D. Receipt

A

Patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are threats to data availability? (Choose two.)

A. Service outage
B. Replay attack
C. Wiretapping
D. Destruction

A

Service outage

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the name of an application that appears to look like a helpful application but instead does harm to your computer?

A. Virus
B. Worm
C. Malware
D. Trojan horse

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Someone was recently caught sifting through your company’s trash looking for confidential information. What is this an example of?

A. Trash snooping
B. Dumpster diving
C. Phishing
D. Social engineering

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are implementing multifactor security on a computer. Which of the following is not a valid factor?

A. Receipt
B. Password
C. Hardware token
D. Specific location

A

Receipt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have been asked to lead a class on preventing social engineering. What two topics should you be sure to cover? (Choose two.)

A. Viruses and worms
B. Shoulder surfing
C. Hardware theft
D. Phishing

A

Shoulder surfing

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On a network, a user needs to access three different types of systems. However, they are required to enter their username and password only when they initially log in. Which term best explains this?

A. Authentication
B. Single sign-on
C. Authorization
D. Nonrepudiation

A

Single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You receive an email from your bank telling you that your account has been compromised and you need to validate your account details or else your account will be closed. You are supposed to click a link to validate your information. What is this an example of?

A. A security breach at your bank that needs to be resolved
B. Spam
C. Ransomware
D. Phishing

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you are concerned about confidentiality of client records, which of the following should you be on the lookout for? (Choose two.)

A. Eavesdropping
B. Denial of service
C. Social engineering
D. Replay attack

A

Eavesdropping

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is it called when a co-worker sitting next to you always seems to look your way when you try to enter your user ID and password to log onto the network?

A. Phishing
B. Social engineering
C. Shoulder surfing
D. Coincidence

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following security terms best describes the process of determining what a user can do with a resource?

A. Authentication
B. Authorization
C. Accounting
D. Nonrepudiation

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following operating systems are susceptible to viruses?

A. Windows
B. Windows and macOS
C. Windows, macOS, and Linux
D. Windows, macOS, Linux, and Android

A

Windows, macOS, Linux, and Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network administrator wants to enable accounting on her network. Which options should she use? (Choose two.)

A. Biometrics
B. Transaction logs
C. Software tokens
D. Web browser history

A

Transaction logs

Web browser history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following can be used as an authentication factor and for nonrepudiation?

A. Password
B. One-time password
C. Biometrics
D. Security question

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your manager is concerned about potential wiretapping on the wireless network. What type of concern is this?

A. Availability
B. Authorization
C. Integrity
D. Confidentiality

A

Confidentiality

17
Q

To log into a network, you must use a password and answer a security question. What is this an example of?

A. Multifactor authentication
B. Single sign-on
C. Authorization
D. Nonrepudiation

A

Multifactor authentication

18
Q

Which of the following threats can directly impact data integrity on a network? (Choose two.)

A. Snooping
B. Man-in-the-middle
C. Impersonation
D. Denial of service

A

Man-in-the-middle

Impersonation

19
Q

Your network’s security model requires that the administrator configure permissions based on a user’s job within the company. What does this describe?

A. Rule-based access control
B. Role-based access control
C. Discretionary access control
D. Mandatory access control

A

Role-based access control

20
Q

Esther has just written a new book, and she wants to ensure that she owns the intellectual property. Which type of protection should she get?

A. Digital product
B. Trademark
C. Patent
D. Copyright

A

Copyright