Encryption, authentication, and anti-malware are all ways to protect against malicious threats. -
Answers True
An example of authorization with "something you are" would be? - Answers Retina Pattern
By an overwhelming percentage, most security / data breaches are caused by: - Answers
Human Error/Negligence
All are types of physical security except: - Answers Concrete Barriers
Which of the following does the "A" in "CIA" stand for when relating to IT security? - Answers
Availability
Social engineering includes viruses, worms, and Trojan horses. - Answers False
Which type of hacker has no affiliation with an organization yet will hack systems without
malicious intent, but yet may be doing something illegal? - Answers Gray Hat
When a network security device experiences a system failure, it is best for it to default to a "Fail
/ Open" state. - Answers False
For information security, what is the I in CIA? - Answers Integrity
Tom sends out many e-mails containing secure information to other companies. What concept
should be implemented to prove that Tom did indeed send the e-mails? - Answers
Nonrepudiation
Which of the following is the greatest risk for removable storage? - Answers Confidentiality of
Data
In information security the three main goals are known as Confidentiality, Integrity, and
Availability. - Answers True
Which is not a type of Social Engineering? - Answers Trojan
Which of the following is an example of a personal software firewall? - Answers ZoneAlarm
Which of the following methods of malware delivery is used in computer programs to bypass
normal authentication? - Answers Backdoor
One of the biggest problems with BYOD is - Answers There is virtually no security control over
the sofware / hardware.
Which of the following occurs when an IDS identifies legitimate activity as something malicious?
- Answers False-Positive
, Opening mail relays can decrease the amount of spam that an organization receives on its e-
mail server. - Answers False
Which of the following is an example of whole disk encryption? - Answers Bitlocker
A master computer controls a botnet. - Answers True
Most antimalware / virus software is signature based. - Answers True
A RAT is an example of a Trojan horse. - Answers True
Malware is software designed to infiltrate a computer system without the users consent. -
Answers True
Active interception is the act of exploiting a bug or design flaw in software. - Answers False
Viruses self-replicate whereas worms do not. - Answers False
The love bug is an example of a rootkit. - Answers False
Which command lists the hotfixes installed to Windows? - Answers systeminfo
What is baselining? - Answers The process of measuring changes in networking devices,
hardware, and software.
Of the following, which can be a security benefit when using virtualization? - Answers If a virtual
machine is compromised, the adverse effects can be compartmentalized.
The second step in a patch management strategy is testing. - Answers True
Which of the following should you implement to keep a well-maintained computer? - Answers
Update the firewall.
Update the BIOS.
Use a surge protector.
Which of the following is the best file system to use in Windows? - Answers NTFS
To open the Local Group Policy Editor console window, a user should type MMC in the Run
prompt. - Answers False
The net stop commands disable services in Windows. - Answers False
Which of the following are virtualization software types? - Answers Microsoft Virtual PC
Microsoft Virtual Server
VMware