• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
Which of the following is considered an independent program that can copy itself from one system to another and its main purpose is to damage data or affect system performance?
a. Virus
b. Worm
c. Spam
d. Spyware
b. Worm
End users are complaining about receiving a lot of email from online vendors and pharmacies. Which of the following is this an example of?
a. Trojan
b. Spam
c. Phishing
d. DNS poisoning
b. Spam
Which of the following is commonly used in a distributed denial of service (DDOS) attack?
a. Phishing
b. Adware
c. Botnet
d. Trojan
c. Botnet
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?
a. Intrusion detection
b. Virtualization
c. Kiting
d. Cloning
b. Virtualization
Assigning proper security permissions to files and folders is the primary method of mitigating which of the following?
a. Hijacking
b. Policy subversion
c. Trojan
d. DoS
c. Trojan
Which of the following allows an attacker to hide the presence of malicious code by altering the systems process and registry entries?
a. Logic bomb
b. Worm
c. Trojan
d. Rootkit
d. Rootkit
Which of the following threats is the MOST difficult to detect and hides itself from the operating system?
a. Rootkit
b. Adware
c. Spyware
d. Spam
a. Rootkit
Which of the following is an attack that is triggered by a specific event or by a date?
a. Logic bomb
b. Spam
c. Rootkit
d. Privilege escalation
a. Logic bomb
A technician is rebuilding the infrastructure for an organization. The technician has been tasked with making sure that the virtualization technology is implemented securely. Which of the following is a concern when implementing virtualization technology?
a. The technician should verify that the virtual servers are dual homed so that traffic is securely separated.
b. The technician should verify that the virtual servers and the host have the latest service packs and patches applied.
c. The technician should subnet the network so each virtual server is on a different network segment.
d. The technician should perform penetration testing on all the virtual servers to monitor performance
b. The technician should verify that the virtual servers and the host have the latest service packs and patches applied.
Which of the following virtual machine components monitors and manages the various virtual instances?
a. VMOS
b. VCPU
c. Hypervisor
d. Virtual supervisor
b. VCPU
After registering an email address on a website, a user starts receiving messages from unknown sources. The email account is new, and therefore the user is concerned. This type of message traffic is referred to as:
a. instant message traffic.
b. SPIM.
c. S/MIME.
d. spam.
d. spam.
Which of the following is an important reason for password protecting the BIOS?
a. To maintain password complexity requirements
b. To prevent system start-up without knowing the password
c. To keep a user from changing the boot order of the system
d. To keep a virus from overwriting the BIOS
c. To keep a user from changing the boot order of the system
A company needs to have multiple servers running low CPU utilization applications. Which of the following is the MOST cost efficient method for accomplishing this?
a. Install multiple high end servers, sharing a clustered network operating system.
b. Install a single low end server, running multiple virtual servers.
c. Install a single high end server, running multiple virtual servers.
d. Install multiple low end servers, each running a network operating system.
c. Install a single high end server, running multiple virtual servers
Which of the following security threats is MOST commonly associated with a targeted distributed denial of service (DDoS)?
a. Viruses
b. Worms
c. Botnets
d. Trojans
c. Botnets
A developer added code to a financial system designed to transfer money to a foreign bank account on a specific time and date. The code would activate only if human resources processed the developers termination papers. The developer implemented which of the following security threats?
a. Logic bomb
b. Rootkit
c. Botnet
d. Privilege escalation
a. Logic bomb
Virtualized applications, such as virtualized browsers, are capable of protecting the underlying operating system from which of the following?
a. Malware installation from suspects Internet sites
b. Man-in-the-middle attacks
c. Phishing and spam attacks
d. DDoS attacks against the underlying OS
a. Malware installation from suspects Internet sites
Which of the following is a security threat that hides its processes and files from being easily detected?
a. Trojan
b. Adware
c. Worm
d. Rootkit
d. Rootkit
An administrator notices on the monthly firewall log that many of the internal PCs are sending packets on a routine basis to a single external PC. Which of the following BEST describes what is occurring?
a. The remote PC has a spam slave application running and the local PCs have a spam master application running.
b. The remote PC has a zombie master application running and the local PCs have a zombie slave application running.
c. The remote PC has a spam master application running and the local PCs have a spam slave application running.
d. The remote PC has a zombie slave application running and the local PCs have a zombie master application running.
The remote PC has a zombie master application running and the local PCs have a zombie slave application running.
Which of the following is the quickest method to create a secure test server for a programmer?
a. Install a network operating system on new equipment.
b. Create a virtual server on existing equipment.
c. Install a network operating system on existing equipment.
d. Create a virtual server on new equipment.
b. Create a virtual server on existing equipment
Which of the following is a risk associated with a virtual server?
a. If the physical server crashes, all of the local virtual servers go offline immediately.
b. If the physical server crashes, all of the physical servers nearby go offline immediately.
c. If a virtual server crashes, all of the virtual servers go offline immediately.
d. If a virtual server crashes, all of the physical servers go offline immediately.
a. If the physical server crashes, all of the local virtual servers go offline immediately.
Which of the following is used to deny authorized users access to services?
a. Botnets
b. Adware
c. Spyware
d. Trojans
a. Botnets
Which of the following is planted on an infected system and deployed at a predetermined time?
a. Logic bomb
b. Trojan horse
c. Worm
d. Rootkit
a. Logic bomb
Which of the following would a former employee MOST likely plant on a server that is not traceable?
a. Worm
b. Logic bomb
c. Trojan
d. Virus
b. Logic bomb
The marketing department wants to distribute pens with embedded USB drives to clients. In the past this client has been victimized by social engineering attacks which led to a loss of sensitive data. The security administrator advises the marketing department not to distribute the USB pens due to which of the following?
a. The risks associated with the large capacity of USB drives and their concealable nature
b. The security costs associated with securing the USB drives over time
c. The cost associated with distributing a large volume of the USB pens
d. The security risks associated with combining USB drives and cell phones on a network
a. The risks associated with the large capacity of USB drives and their concealable nature
USB drives create a potential security risk due to which of the following?
a. Operating system incompatibility
b. Large storage capacity
c. Widespread use
d. Potential for software introduction
d. Potential for software introduction
Which of the following describes a logic bomb?
a. A piece of malicious code that can spread on its own
b. A piece of malicious code that is concealed from all detection
c. A piece of malicious code that executes based on an event or date
d. A piece of malicious code that exploits a race condition
c. A piece of malicious code that executes based on an event or date
Which of the following is the GREATEST threat to highly secure environments?
a. Network attached storage
b. BIOS configuration
c. RSA256
d. USB devices
d. USB devices
Management has asked a technician to prevent data theft through the use of portable drives. Which of the following should the technician implement?
a. Install a CCTV system.
b. Use security templates.
c. Implement a biometric system.
d. Disable USB drives.
d. Disable USB drives.
A technician has been informed that many of the workstations on the network are flooding servers. Which of the following is the MOST likely cause of this?
a. Worm
b. Logic bomb
c. Virus
d. Spam
a. Worm
Which of the following is a security reason to implement virtualization throughout the network infrastructure?
a. To analyze the various network traffic with protocol analyzers
b. To centralize the patch management of network servers
c. To isolate the various network services and roles
d. To implement additional network services at a lower cost
c. To isolate the various network services and roles
One of the security benefits to using virtualization technology is:
a. if an instance is compromised the damage can be compartmentalized.
b. applying a patch to the server automatically patches all instances.
c. if one instance is compromised no other instances can be compromised.
d. virtual instances are not affected by conventional port scanning techniques.
a. if an instance is compromised the damage can be compartmentalized.
A virtual server implementation attack that affects the:
a. OS kernel will affect all virtual instances.
b. disk partition will affect all virtual instances.
c. system registry will affect all virtual instances.
d. RAM will affect all virtual instances.
d. RAM will affect all virtual instances.
Which of the following BEST describes an application or string of code that cannot automatically spread from one system to another but is designed to spread from file to file?
a. Adware
b. Worm
c. Botnet
d. Virus
d. Virus
Which of the following is considered an independent program that can copy itself from one system to another and its main purpose is to damage data or affect system performance?
a. Virus
b. Worm
c. Spam
d. Spyware
b. Worm
All of the following are considered malware EXCEPT:
a. spam.
b. Trojan.
c. virus.
d. logical bombs.
a. spam.
An application that gets downloaded onto a system by appearing to be a useful tool for cleaning out duplicate contacts in a users emails would be considered:
a. spyware.
b. spam.
c. a worm.
d. a Trojan.
d. a Trojan
Which of the following is the GREATEST security risk regarding removable storage?
a. Integrity of data
b. Not enough space available
c. Availability of data
d. Confidentiality of data
d. Confidentiality of data
Which of the following mimics a legitimate program in order to steal sensitive data?
a. Botnet
b. Worm
c. Spam
d. Trojan
d. Trojan
The GREATEST security concern in regards to data leakage with USB devices is:
a. speed.
b. physical size.
c. OS compatibility.
d. storage capacity.
b. physical size.
Virtual machines are MOST often used by security researchers for which of the following purposes?
a. To provide a secure virtual environment to conduct online deployments
b. To provide a virtual collaboration environment to discuss security research
c. To provide an environment where new network applications can be tested
d. To provide an environment where malware can be executed with minimal risk to equipment and software
d. To provide an environment where malware can be executed with minimal risk to equipment and software
Once a system has been compromised, often the attacker will upload various tools that can be used at a later date. The attacker could use which of the following to hide these tools?
a. Logic bomb
b. Rootkit
c. Virus
d. Trojan
b. Rootkit
Logic bombs differ from worms in that:
a. logic bombs cannot be sent through email.
b. logic bombs cannot spread from computer to computer.
c. logic bombs always contain a Trojan component.
d. logic bombs always have a date or time component.
d. logic bombs always have a date or time component.
Which of the following is MOST likely to cause pop-ups?
a. Botnets
b. Adware
c. Spam
d. Rootkit
b. Adware
Which of the following is MOST likely to open a backdoor on a system?
a. Botnet
b. Trojan
c. Logic bomb
d. Worm
b. Trojan
Which of the following will prevent a person from booting into removal storage media if the correct boot sequence is already set?
a. BIOS password settings
b. BIOS power on settings
c. USB key settings
d. BIOS boot options
a. BIOS password settings
Which of the following is a security risk associated with USB drives?
a. Easy to conceal and detect
b. Large storage capacity and high visibility
c. Small storage capacity and low visibility
d. Easy to conceal and large storage capacity
d. Easy to conceal and large storage capacity
The availability of portable external storage such as USB hard drives has increased which of the following threats to networks?
a. Introduction of material on to the network
b. Introduction of rogue wireless access points
c. Removal of sensitive and PII data
d. Increased loss business data
. Removal of sensitive and PII data
An administrator finds a device attached between the USB port on a host and the attached USB keyboard. The administrator has also noticed large documents being transmitted from the host to a host on an external network. The device is MOST likely which of the following?
a. External USB drive
b. In-line keystroke logger
c. In-line network analyzer
d. USB external hub
b. In-line keystroke logger
Which of the following will be prevented by setting a BIOS password?
a. A machine becoming infected with a virus
b. Changing the system boot order
c. Replacing a video card on a machine
d. A machine becoming infected with a botnet
b. Changing the system boot order
Which of the following is considered an independent program that can copy itself from one system to another and its main purpose is to damage data or affect system performance?
a. Virus
b. Worm
c. Spam
d. Spyware
b. Worm