• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
14.01
Which of the following is a type of denial of service attack?
A. Ping of Death
B. Stacheldraht
C. SYN flood
D. All of the above


Which of the following is a type of denial of service attack?
A. Ping of Death
B. Stacheldraht
C. SYN flood
D. All of the above



14.02
Which is not a type of threat that can affect your network?
A. Worm
B. Phishing
C. Access control list
D. Rogue access point


Which is not a type of threat that can affect your network?
A. Worm
B. Phishing
C. Access control list
D. Rogue access point



14.03
Which type of virus impacts .COM, .EXE, and .DLL files?
A. File viruses
B. SYN flood
C. Smurf
D. Tribe Flood Network


Which type of virus impacts .COM, .EXE, and .DLL files?
A. File viruses (Though the attacks below may employ a virus or backdoor to create zombie nets, they are DoS attacks… and not machine-specific.)
B. SYN flood
C. Smurf
D. Tribe Flood Network



14.04
Which type of virus uses the Visual Basic macro-scripting language to perform malicious or
mischievous functions in data files?
A. IP spoofing
B. File
C. Macro
D. None of the above


Which type of virus uses the Visual Basic macro-scripting language to perform malicious or
mischievous functions in data files?
A. IP spoofing
B. File
C. Macro
D. None of the above



14.05
Monkey B, Michelangelo, Stoned, and Stealth Boot are examples of which type of virus?
A. IP spoofing
B. Multipartite
C. Macro
D. Boot sector


Monkey B, Michelangelo, Stoned, and Stealth Boot are examples of which type of virus?
A. IP spoofing
B. Multipartite
C. Macro
D. Boot sector



14.06
Which type of virus affects both the boot sector and files on a computer?
A. Mulipartite
B. Macro
C. Tribe Flood Network 2000 (TFN2K)
D. Smurf


Which type of virus affects both the boot sector and files on a computer?
A. Mulipartite
B. Macro
C. Tribe Flood Network 2000 (TFN2K)
D. Smurf



14.07
What is the main difference between a worm and a virus?
A. Worms require user action for replication.
B. Viruses do not require user intervention for replication.
C. Worms can replicate without user intervention.
D. None of the above


What is the main difference between a worm and a virus?
A. Worms require user action for replication.
B. Viruses do not require user intervention for replication.
C. Worms can replicate without user intervention.
D. None of the above



14.08
What kind of attack could a hacker use to target a network that tries to log in to some type
of shared network resource?
A. Packet sniffers
B. Brute-force attack
C. Worm
D. Backdoor


What kind of attack could a hacker use to target a network that tries to log in to some type
of shared network resource?
A. Packet sniffers
B. Brute-force attack (This is the only attack type that “tries to log in.”)
C. Worm
D. Backdoor



14.09
What type of security threat allows an attacker to learn your password through the use of
an email or phone call?
A. Phishing
B. Trust-exploration attack
C. Man-in-the-middle attack
D. Rogue access point


What type of security threat allows an attacker to learn your password through the use of
an email or phone call?
A. Phishing
B. Trust-exploration attack
C. Man-in-the-middle attack
D. Rogue access point



14.10
Which type of policy should be implemented to secure important company documents and
materials when employees leave their workstations?
A. Clean housekeeping
B. Clean desk
C. Security audit
D. Proactive defense


Which type of policy should be implemented to secure important company documents and
materials when employees leave their workstations?
A. Clean housekeeping
B. Clean desk
C. Security audit
D. Proactive defense



14.11
If you implement a set of policies and procedures that define corporate information as
confidential and then train employees on these procedures prevents what type of attack?
A. DoS
B. Man-in-the-middle attacks
C. Smurf
D. Social engineering


If you implement a set of policies and procedures that define corporate information as
confidential and then train employees on these procedures prevents what type of attack?
A. DoS
B. Man-in-the-middle attacks
C. Smurf
D. Social engineering



14.12
If an employee leaves a company voluntarily, what type of interview should be conducted?
A. Entrance
B. Application
C. Exit
D. Manager rating


If an employee leaves a company voluntarily, what type of interview should be conducted?
A. Entrance
B. Application
C. Exit
D. Manager rating



14.13
What defines the appropriate response to a security event on a network?
A. Implementing security procedures
B. Installing a new router
C. Turning off the network
D. HR policy for dress code


What defines the appropriate response to a security event on a network?
A. Implementing security procedures
B. Installing a new router
C. Turning off the network
D. HR policy for dress code



14.14
What type of virus works its way into the master boot record and changes the pointer to
your operating system?
A. DoD virus
B. Boot-sector virus
C. File-system virus
D. Macro virus


What type of virus works its way into the master boot record and changes the pointer to
your operating system?
A. DoD virus
B. Boot-sector virus
C. File-system virus
D. Macro virus



14.15
What process allows you to update your Windows-based operating system?
A. Technet
B. Windows Update
C. Text message
D. Hot fix


What process allows you to update your Windows-based operating system?
A. Technet
B. Windows Update
C. Text message
D. Hot fix



14.16
Why is it important to keep your system patched and up to date?
A. To completely stop your need for security
B. To increase the functionality of your applications
C. To fix system vulnerabilities
D. To make Windows completely safe and worry free


Why is it important to keep your system patched and up to date?
A. To completely stop your need for security
B. To increase the functionality of your applications
C. To fix system vulnerabilities
D. To make Windows completely safe and worry free



14.17
A network administrator wanting to assign passwords to network resources only would
implement which type of security?
A. Building password
B. Group password
C. Share-level security
D. User-level security


A network administrator wanting to assign passwords to network resources only would
implement which type of security?
A. Building password
B. Group password
C. Share-level security
D. User-level security



14.18
Which type of scanning allows an antivirus program to search for a virus even if there is no
definition for it?
A. Update scan
B. Signature-file scan
C. Database scan
D. Heuristic scan


Which type of scanning allows an antivirus program to search for a virus even if there is no
definition for it?
A. Update scan
B. Signature-file scan
C. Database scan
D. Heuristic scan



14.19
What type of files need to be updated in order for your antivirus program to have the latest
information about attacks and viruses?
A. Definition files
B. Email files
C. .doc files
D. .exe files


What type of files need to be updated in order for your antivirus program to have the latest
information about attacks and viruses?
A. Definition files
B. Email files
C. .doc files
D. .exe files



14.20
What type of scan can be done by an antivirus program?
A. Emergency
B. On-demand
C. On-access
D. All of the above


What type of scan can be done by an antivirus program?
A. Emergency
B. On-demand
C. On-access
D. All of the above (Note that in the Emergency mode, only the AV and OS are running. All other applications are shut down. This is accessed via the AV’s emergency disk.)



14.21
The Ping of Death and SYN floods are examples of what types of attack?

Denial of service (DoS)


14.22
How often should you update your virus definitions in your antivirus software?

Once per week


14.23
What is the U.S. Department of Defense standard for individual computers?

Trusted computer system


14.24
What type of virus attacks executable programs?

A file virus


14.25
What kind of tool could a hacker use to intercept traffic on your network?

Packet sniffer


14.26
What type of virus uses Microsoft’s Visual Basic scripting language?

A macro virus


14.27
What is it called when someone intercepts traffic on your network that’s intended for a different
destination computer?


Man-in-the-middle attack


14.28
If someone installed a wireless router on your network without your knowledge, that would
be called___________________.


A rogue access point


14.29
What software application can help automatically ensure that your Windows-based computers
have the most current security patches?


Windows Update


14.30
The two different types of virus scans are ___________________.

On-demand and on-access