chapter 9

Card Set Information

Author:
studysuccess
ID:
135448
Filename:
chapter 9
Updated:
2012-02-15 00:41:58
Tags:
easy resident technician certification
Folders:

Description:
staples
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user studysuccess on FreezingBlue Flashcards. What would you like to do?


  1. which component of physical security addresses outer-level access control?
    A) perimeter security
    B) security zones
    C) locked doors
    D) mantraps
    A) perimeter security
    (this multiple choice question has been scrambled)
  2. which technology uses a physical characteristics to establish identity?
    A) biometrics
    B) surveillance
    C) smart card
    D) CHAP authenticator
    A) biometrics
    (this multiple choice question has been scrambled)
  3. as part of your training program, you're trying to educate users on the importance of security. you explain to them that not every attack depends on implementing advanced technological methods. some attacks, you explain, take advantage of human shortcoming to gain access that should otherwise be denied. what term do you use to describe attacks of this type?
    A) biometrics
    B) perimeter security
    C) social engineering
    D) IDS system
    C) social engineering
    (this multiple choice question has been scrambled)
  4. you've recently been hired by ACME to do a security audit. the managers of this company feel that their current security measures are inadequate. which information-access control prevents users from writing information down to a lower level of security and prevents users from reading above their level of security?
    A) bell la-padula model
    B) biba model
    C) clark-wilson model
    D) noninterference model
    A) bell la-padula model
    (this multiple choice question has been scrambled)
  5. although you're talking to her on the phone, the sound of the administrative assistant's screams of despair can be heard down the hallway. she has inadvertently deleted a file that the boss desperately needs. Which type of backup is used for the immediate recovery of a lost file?
    A) incremental backup
    B) onsite storage
    C) working copies
    D) differential backup
    C) working copies
    (this multiple choice question has been scrambled)
  6. you're trying to rearrange your backup procedures to reduce the amount of time they take each evening. you want the backups to finish as quickly as possible during the week. which backup system backs up only the files that have changed since the last backup?
    A) incremental backup
    B) backup server
    C) full backup
    D) differential backup
    A) incremental backup
    (this multiple choice question has been scrambled)
  7. which backup system backs up all the files that have changed since the last full backup?
    A) differential backup
    B) full backup
    C) incremental backup
    D) archival backup
    A) differential backup
    (this multiple choice question has been scrambled)
  8. You've been assigned to mentor a junior administrator and bring him up to speed quickly. the topic you're currently explaining is authentication. which method uses a KDC to accomplish authentication for users, programs, or systems?
    A) smart cards
    B) Biometrics
    C) CHAP
    D) Kerberos
    D) Kerberos
    (this multiple choice question has been scrambled)
  9. which authentication method sends a challenge to the client that is encrypted and then sent back to the server?
    A) PAP
    B) kerberos
    C) CHAP
    D) DAC
    C) CHAP
    (this multiple choice question has been scrambled)
  10. after a careful risk analysis, the value of your company's data has been increased. accordingly, you're expected to implement authentication solutions that reflect the increased value of the data. which of the folllowing authentication methods uses more than one authentication process for a logon?
    A) multifactor
    B) smart card
    C) biometrics
    D) kerberos
    A) multifactor
    (this multiple choice question has been scrambled)
  11. which of the following services or protocols should be avoided in a network if possible in order to increase security?
    A) ICMP
    B) telnet
    C) e-mail
    D) WWW
    B) telnet
    (this multiple choice question has been scrambled)
  12. Of the following services, which one would be most likely to utilize a retinal scan?
    A) authentication
    B) auditing
    C) access control
    D) data confidentiality
    A) authentication
    (this multiple choice question has been scrambled)
  13. one of the vice presidents of the company calls a meeting with information technology after a recent trip to competitors' sites. she reports that many of the companies she visited granted access to their buildings only after fingerprint scan, and she wants similar technology employed at this company. of the following, which technology relies on a physical attribute of the user for authentication?
    A) smart card
    B) mutual authentication
    C) biometrics
    D) tokens
    C) biometrics
    (this multiple choice question has been scrambled)
  14. Your com[any provides medical data to doctors from a worldwide database. because of the sensitive nature of the data you work with, it's imperative that authentication be established on each session and be valid only for that session. which of the following authentcation methods provides credentials that are valid only during a single session?
    A) kerberos
    B) smart card
    C) tokens
    D) certificate
    C) tokens
    (this multiple choice question has been scrambled)
  15. your help desk has informed you that they receive an urgent call from the vice president last night requesting his login ID and password. what type of attack is this?
    A) trojan horse
    B) replay attack
    C) social engineering
    D) spoofing
    C) social engineering
    (this multiple choice question has been scrambled)
  16. internal users are reporting repeated attempts to infect their systems as reported to them by pop-up messages from their virus-scanning software. according to the pop-up messages, the virus seems to be the same in every case. what is the most likely culprit?
    A) A DoS attack is underway
    B) you have a caterpillar virus
    C) your antivirus software has malfunctioned.
    D) a server is acting as a carrier for a virus
    D) a server is acting as a carrier for a virus
    (this multiple choice question has been scrambled)
  17. You're working late one night, and you notice that the hard disk on our new computer is very active even though you aren't doing anything on the computer and it isn't connected to the internet. what is the most likely suspect?
    A) your system is under a DoS attack
    B) TCP/IP hijacking is being attempted
    C) a disk failure is imminent
    D) a virus is spreading in you system
    D) a virus is spreading in you system
    (this multiple choice question has been scrambled)
  18. You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discrepancies. This month, your e-mail system error log reports a large number of unsuccessful attempts to log on. it's apparent that the e-mail server is being targeted. which type of attack is more likely occurring?
    A) worm
    B) TCP/IP hijacking
    C) backdoor attack
    D) software exploration attack
    D) software exploration attack
    (this multiple choice question has been scrambled)
  19. upper management has decreed that a firewall must be put in place immediately, before your site suffers an attack similar to one that struck a sister com[any. Responding to this order, your boss instructs you to implement a packet filter by the end of the week. A packet filter performs which function?
    A) allows all packets to leave the network
    B) eliminates collisions in the network
    C) prevents unauthorized packets from entering the network
    D) allow all packets to enter the network
    C) prevents unauthorized packets from entering the network
    (this multiple choice question has been scrambled)
  20. which media is susceptible to viruses
    a) tape
    b) memory stick
    c) CD-R
    d) all of the above
    d) all of the above

What would you like to do?

Home > Flashcards > Print Preview