• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/38

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

38 Cards in this Set

  • Front
  • Back

Which of the following is a vital part of any firewall strategy?

The security policies created by firewall administrators

Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:

to call, text or IM James before opening the attachment, to verify that he intended to send it.

A firewall can perform which task?

Prevent unauthorized access to proprietary data on an intranet

You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding to keyboard and mouse input. You suspect that you have accidentally downloaded a virus. Which of the following actions most likely caused this?

You opened an e-mail attachment.

What do encryption applications do to render text unreadable?

Scramble text using mathematical algorithms

Secure authentication requires:

a user name, a password, and encryption of this information.

Which term is used to describe a program that appears to be harmless but actually produces malicious or harmful results?

Trojan

Which term is used to describe a computer security program that is enabled when no keystrokes or mouse actions have occurred on the system for a specified duration?

Screen saver

Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?

Digital certificate

Bob opened an e-mail attachment and it launched a virus. The virus took control of his system, and now he is unable to run his anti-virus software. What should he do next?

Turn off his computer and reboot from a clean system disk

Computer viruses can cause damage ranging from relatively minor to debilitating. You can protect your system against viruses by using commercial virus-detection software to find and defeat viruses. Because new viruses are created so rapidly, what must you do to ensure that your anti-virus software can protect you?

Install anti-virus software program updates to keep the signature profiles current.

Which statement best describes asymmetric-key encryption?

An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message

Which term is used to describe an application that installs hidden services on a system that enables the attacker to monitor and control the operation of the system?

Illicit server

Which encryption method provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption?

Hash encryption

Which statement best describes symmetric-key encryption?

An encryption method in which the same key is used to encrypt and decrypt a message

Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against virus attacks?

Update the definitions on your anti-virus application frequently.

You suspect that an attacker has gained control of your computer system. What action should you take next?

Unplug the computer network cable and/or disable the computer's wireless NIC.

You receive an unexpected e-mail with an attachment from a co-worker. You call the co-worker to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. Which of the following is your co-worker's best response to your question?

She should ask you to read her the e-mail message including the full name of the attachment and its extension.

Which term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes?

Spyware

Which of the following is an effective way for Web site owners to prevent typosquatting?

Purchase domain names that are similar to their actual domain names

You have registered for an e-learning course and are ready to begin. However, when you access the e-learning course page as directed, you find that you cannot log in because the authentication window will not launch. The most likely cause of this problem is that:

you have enabled pop-up blocking software in your browser.

Which statement is true regarding a virus attack on your system?

Most viruses can be halted after they commence an attack and can be removed without permanent damage to your system.

Which is the most common method used to authenticate users on private and public computer networks?

User names and passwords

When your company's private LAN is protected by a firewall, which of the following is true?

Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.

Brea opened an e-mail attachment and it launches a virus. Even after running anti-virus software, the damage is extensive and she will have to reformat her hard drive. Which step, if she had taken it prior to being attacked, would have reduced the impact to her productivity?

Performing regularly scheduled backups so that she can reload all files if lost or damaged

Which statement correctly compares computer viruses and worms?

A virus requires user action to replicate, but a worm can replicate by itself.

What can you use to electronically verify your identity without the need to provide data confidentiality?

Digital signature

Which statement best describes hash encryption?

An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

You receive a text message on your cell phone from an unknown number. The message includes an attachment. You try to call the number but you get no answer. What is the best action for you to take next?

Delete the message without opening the attachment

Which of the following is an electronic stamp that can verify the integrity of data and the identity of the message source?

Digital signature

Which term is used to describe the process that converts data into an unreadable form of text?

Encryption

Which of the following is the most common method for spreading viruses?

Opening attachments

Which term best describes a collection of software tools that provide a permanent solution to known program bugs?

Update

What distinguishes a worm from a virus?

A worm is capable of replicating itself automatically while affecting data.

Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?

Digital signature

What does anti-virus software do?

It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.

A digital signature verifies the identity of the sender and provides data integrity. Which of the following does it also do?

Enforces non-repudiation

Which term best describes a file of programming code that provides a temporary fix to a known bug?

Patch