• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
10.1 As part of your education program your trying to educate users on the importance of security. You explain to them that not every attack depends on implementing advanced technological methods. Some attacks take advantage of human shortcomings to gain access that should otherwise be denied. What term do you use to describe attacks of this type?
a. Social Engineering

b. IDS system


c. Perimeter security


d. Biometrics

10.2 Which of the following is another name for social engineering?
a. Social disguise

b. Socail Hacking


c. Wetware


d. Wetfire

10.3 Which of the following is the best description of tailgating?
a. Following someone through a door they just unlocked.

b. Figuring our how to unlock and secure door


c. Sitting close to someone in a meeting


d. Stealing infomration from someones's desk

10.4 What is the form of social engineering in which you simply ask someone for a piece of information that you want by making it look like a legitimate request?
a. Hoaxing

b. Swimming


c. Spamming


d. Phising

10.5 When you combine phishing with voice over IP, its known as:
a. Spoofing

b. Spooning


c. Whaling


d. Vishing

10.6 Which of the following is the best description of shoulder surfing?
a. Following someone through a door they just unlocked

b. Figuring how to unlock a secure area


c. Watching someone enter important information


d. Stealing information from someone else desk.

10.7 Which of the following is a high-security installation that requires visual identification, as well as authentication, to gain access?
a. Mantrap

b. Fencing


c. Proximity reader


d. Hot aisle

10.8 You've been drafted for the safety committee.. One of your task is to inventory all of the fire extinguishers and make certain that the correct types are in the correct lotions throughout the building. Which of the following categories of fire extinguisher is intended for use on electrical fires
a. Type a

b. Type b


c. Type c


d. Type d

10.9 Which of the following will not reduce EMI?
a. Physical shielding

b. Humidity control


c. Physical Location


d. Overhauling worn motors

10.10 Which of the following is an example of perimeter security
a. Chain link fence

b. Video camera


c. Elavator


d. Locked computer room

10.11 Your a leader in the committee at ACME company. After a move to a new facility, you're installing a new security monitoring system throughout. Which of the following best describes a motion detector mounted in the corner of a hallway?
a. Perimeter security

b. Partitioning


c. Security zone


d. IDS system

10.12 Which technology uses a physical characteristic to establish identity?
a. Bio metric

b. Surveillance


c. Smart card


d. CHAP authentication

10.13 The process of reducing or eliminating susceptibility to outside interference is called what?
a. Shielding

b. EMI


c. TEMPEST


d. Desensitization

10.14 You work for a electronics company that just developed a device that emits less RF than any competitor's product. Given the enormous importance of the invention and of the marketing benefits it could offer, you want to have the product certified. Which certification is used to indicate minimal electronic emissions?
a. EMI

b. RFI


c. CCEAL 4


d. TEMPEST

10.15 Due to growth beyond current capacity, a new server room is being built. As manager, you want to make certain that all of the necessary safety elements exist in the room when it's finished. Which fire-suppression system works best when used in an enclosed area by displacing the air around a fire?
a. Gas based

b. Water based


c. Fixed system


d. Overhead sprinklers

10.16 Type K fire extinguishers are intended for use on cooking oil fires. This type is a subset of which other type of fire extinguisher?
a. Type a

b. Type b


c. Type c


d. Type d

10.17 Proximity readers work with which of the following (Choose all that apply)
a. 15.75 fob card

b. 14,32 surveillance card


c. 13.56 MHZ smart card


d. 125 kHz proximity card

10.18 In a hot and cold isle system, what is the typical method of handling cold air?
a. it is pumped in from below raised tiles

b. it is pumped in from above through the ceiling tiles


c. only hot air is extracted and cold air is the natural result


d. Cold air exists in each aisle

10.19 If RF levels become too high, it can cause the receiver in wireless units to become deaf. This process is called:
a. Clipping

b. Desensitizing


c. Distorting


d. Cracking

10.20 RFI is the byproduct of electrical processes, similar to EMI. The major difference is that RFI is usually projected across which of the following?
a. Network MediumB. Electrical Wiringc. Radio Spectrumd. Portable media