SECURITY+ DCOM 258 QUESTIONS & ANSWERS
Encryption, authentication, and anti-malware are all ways to protect against malicious
threats. - Answers - True
An example of authorization with "something you are" would be? - Answers - Retina
Pattern
By an overwhelming percentage, most security / data breaches are caused by: -
Answers - Human Error/Negligence
All are types of physical security except: - Answers - Concrete Barriers
Which of the following does the "A" in "CIA" stand for when relating to IT security? -
Answers - Availability
Social engineering includes viruses, worms, and Trojan horses. - Answers - False
Which type of hacker has no affiliation with an organization yet will hack systems
without malicious intent, but yet may be doing something illegal? - Answers - Gray Hat
When a network security device experiences a system failure, it is best for it to default
to a "Fail / Open" state. - Answers - False
For information security, what is the I in CIA? - Answers - Integrity
Tom sends out many e-mails containing secure information to other companies. What
concept should be implemented to prove that Tom did indeed send the e-mails? -
Answers - Nonrepudiation
Which of the following is the greatest risk for removable storage? - Answers -
Confidentiality of Data
In information security the three main goals are known as Confidentiality, Integrity, and
Availability. - Answers - True
Which is not a type of Social Engineering? - Answers - Trojan
Which of the following is an example of a personal software firewall? - Answers -
ZoneAlarm
Which of the following methods of malware delivery is used in computer programs to
bypass normal authentication? - Answers - Backdoor
One of the biggest problems with BYOD is - Answers - There is virtually no security
control over the sofware / hardware.
, Which of the following occurs when an IDS identifies legitimate activity as something
malicious? - Answers - False-Positive
Opening mail relays can decrease the amount of spam that an organization receives on
its e-mail server. - Answers - False
Which of the following is an example of whole disk encryption? - Answers - Bitlocker
A master computer controls a botnet. - Answers - True
Most antimalware / virus software is signature based. - Answers - True
A RAT is an example of a Trojan horse. - Answers - True
Malware is software designed to infiltrate a computer system without the users consent.
- Answers - True
Active interception is the act of exploiting a bug or design flaw in software. - Answers -
False
Viruses self-replicate whereas worms do not. - Answers - False
The love bug is an example of a rootkit. - Answers - False
Which command lists the hotfixes installed to Windows? - Answers - systeminfo
What is baselining? - Answers - The process of measuring changes in networking
devices, hardware, and software.
Of the following, which can be a security benefit when using virtualization? - Answers -
If a virtual machine is compromised, the adverse effects can be compartmentalized.
The second step in a patch management strategy is testing. - Answers - True
Which of the following should you implement to keep a well-maintained computer? -
Answers - Update the firewall.
Update the BIOS.
Use a surge protector.
Which of the following is the best file system to use in Windows? - Answers - NTFS
To open the Local Group Policy Editor console window, a user should type MMC in the
Run prompt. - Answers - False
The net stop commands disable services in Windows. - Answers - False
Encryption, authentication, and anti-malware are all ways to protect against malicious
threats. - Answers - True
An example of authorization with "something you are" would be? - Answers - Retina
Pattern
By an overwhelming percentage, most security / data breaches are caused by: -
Answers - Human Error/Negligence
All are types of physical security except: - Answers - Concrete Barriers
Which of the following does the "A" in "CIA" stand for when relating to IT security? -
Answers - Availability
Social engineering includes viruses, worms, and Trojan horses. - Answers - False
Which type of hacker has no affiliation with an organization yet will hack systems
without malicious intent, but yet may be doing something illegal? - Answers - Gray Hat
When a network security device experiences a system failure, it is best for it to default
to a "Fail / Open" state. - Answers - False
For information security, what is the I in CIA? - Answers - Integrity
Tom sends out many e-mails containing secure information to other companies. What
concept should be implemented to prove that Tom did indeed send the e-mails? -
Answers - Nonrepudiation
Which of the following is the greatest risk for removable storage? - Answers -
Confidentiality of Data
In information security the three main goals are known as Confidentiality, Integrity, and
Availability. - Answers - True
Which is not a type of Social Engineering? - Answers - Trojan
Which of the following is an example of a personal software firewall? - Answers -
ZoneAlarm
Which of the following methods of malware delivery is used in computer programs to
bypass normal authentication? - Answers - Backdoor
One of the biggest problems with BYOD is - Answers - There is virtually no security
control over the sofware / hardware.
, Which of the following occurs when an IDS identifies legitimate activity as something
malicious? - Answers - False-Positive
Opening mail relays can decrease the amount of spam that an organization receives on
its e-mail server. - Answers - False
Which of the following is an example of whole disk encryption? - Answers - Bitlocker
A master computer controls a botnet. - Answers - True
Most antimalware / virus software is signature based. - Answers - True
A RAT is an example of a Trojan horse. - Answers - True
Malware is software designed to infiltrate a computer system without the users consent.
- Answers - True
Active interception is the act of exploiting a bug or design flaw in software. - Answers -
False
Viruses self-replicate whereas worms do not. - Answers - False
The love bug is an example of a rootkit. - Answers - False
Which command lists the hotfixes installed to Windows? - Answers - systeminfo
What is baselining? - Answers - The process of measuring changes in networking
devices, hardware, and software.
Of the following, which can be a security benefit when using virtualization? - Answers -
If a virtual machine is compromised, the adverse effects can be compartmentalized.
The second step in a patch management strategy is testing. - Answers - True
Which of the following should you implement to keep a well-maintained computer? -
Answers - Update the firewall.
Update the BIOS.
Use a surge protector.
Which of the following is the best file system to use in Windows? - Answers - NTFS
To open the Local Group Policy Editor console window, a user should type MMC in the
Run prompt. - Answers - False
The net stop commands disable services in Windows. - Answers - False