Chapter 9 test

Card Set Information

Author:
20Gt
ID:
268205
Filename:
Chapter 9 test
Updated:
2014-04-20 07:27:59
Tags:
ch9 dd test zz t4
Folders:
CompTIA Strata study guide
Description:
CompTIA Strata study guide
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user 20Gt on FreezingBlue Flashcards. What would you like to do?


  1. 1. Which of these is not a type of access control?
    A. Fingerprint reader
    B. Biometric device
    C. Pop-up
    D. Password
    C. A pop-up is a browser window that opens automatically from another browser window. Fingerprint readers are an example of biometric devices, which use physical characteristics for access control.
    (this multiple choice question has been scrambled)
  2. 2. On some Windows servers, is used to manage usernames and passwords.
    A. BIOS
    B. Active Directory
    C. A retina scanner
    D. POST
    B. Active Directory is an application that Windows servers use to manage user identities on the network.
    (this multiple choice question has been scrambled)
  3. 3. Which of these passwords is the strongest?
    A. MikeSmith
    B. (1776)Independence!
    C. password
    D. 123456789
    B. A strong password is long, varied, and unusual, containing no guessable words or predictable number patterns.
    (this multiple choice question has been scrambled)
  4. 4. A smart card is a plastic card that contains a(n) .
    A. Bar code
    B. Microchip
    C. Serial number
    D. Magnetic strip
    B. Smart cards contain microchips that can be read by a security system or another chip reader.
    (this multiple choice question has been scrambled)
  5. 5. Which of these is not a biometric authentication method?
    A. Facial-recognition software
    B. Fingerprint reader
    C. Retina scanner
    D. Smart card
    D. A smart card does not read any biological characteristic of the person who holds it.
    (this multiple choice question has been scrambled)
  6. 6. When you are connecting to a wireless Internet connection in an airport, which is the best way to categorize that connection for network sharing purposes?
    A. Work
    B. Private
    C. Home
    D. Public
    D. When connecting to a public access point, use the Public option in Windows to turn off file and printer sharing for that connection.
    (this multiple choice question has been scrambled)
  7. 7. Which of these is a form of wireless encryption?
    A. WAP
    B. WPA
    C. WTO
    D. WSS
    B. WPA, or Wi-Fi Protected Access, is one form of wireless encryption for a network. Another is WEP (Wired Equivalent Privacy), which is older and less secure.
    (this multiple choice question has been scrambled)
  8. 8. Firewalls block unauthorized activity on .
    A. Ports
    B. Drivers
    C. Passwords
    D. Websites
    A. Firewalls prevent network ports from being used by unauthorized programs.
    (this multiple choice question has been scrambled)
  9. 9. A criminal who calls you, pretends to be from your bank, and asks you for your Social Security number is using.
    A. A virus
    B. Social engineering
    C. A Trojan horse
    D. A worm
    B. Social engineering is the technique of tricking a person into providing information that they should keep private.
    (this multiple choice question has been scrambled)
  10. 10. Which of these pieces of information should you never give out to strangers online?
    A. Where you were born
    B. Your Social Security number
    C. Your date of birth
    D. All of the above
    D. All of those pieces of information can be used to steal your identity and should be kept private.
  11. 11. A(n) is a plain text file that a web page stores on your hard disk for tracking purposes.
    A. Fish
    B. ActiveX control
    C. Cookie
    D. Pop-up
    C. A cookie stores information a website can reuse when you visit that site, such as your country preferences, name, and buying history.
    (this multiple choice question has been scrambled)
  12. 12. What is the prefix for a URL for a secure website?
    A. secure://
    B. ssl://
    C. https://
    D. http://
    C. The prefix https:// indicates that the secure HTTP protocol will be used for that connection.
    (this multiple choice question has been scrambled)
  13. 13. How does your browser determine whether a security certificate is valid?
    A. It makes sure the date of issue is in the past.
    B. There is no way to determine whether itÂ’s valid.
    C. It checks with a certificate-issuing authority.
    D. It performs a math calculation on it.
    C. Certificates are certified by an online authority, which is a company that maintains a database of valid Certificates and their identifying codes.
    (this multiple choice question has been scrambled)
  14. 14. A site that resembles a secure site such as PayPal but that tries to steal your login information is a(n) site.
    A. Trojan horse
    B. Hacker
    C. Phishing
    D. Cookie
    C. A phishing site is one that masquerades as a legitimate site in order to steal your private information.
    (this multiple choice question has been scrambled)
  15. 15. How can you minimize the threat of operating system vulnerabilities being exploited by hackers?
    A. Defragment your hard disk regularly.
    B. Install all OS updates as they become available.
    C. Use a pop-up blocker.
    D. All of the above.
    B. OS updates are the best way to patch vulnerabilities that can lead to exploits that harm your system.
    (this multiple choice question has been scrambled)
  16. 16. What type of attack does the SmartScreen filter in Internet Explorer prevent?
    A. Phishing
    B. Third-party cookies
    C. ActiveX
    D. Pop-ups
    A. The SmartScreen filter is an antiphishing tool.
    (this multiple choice question has been scrambled)
  17. 17. A(n) program pretends to be useful but in fact does something malicious to your system, such as compromising your privacy.
    A. Virus
    B. Worm
    C. Trojan horse
    D. Denial of service
    C. A Trojan horse, like its namesake from ancient Greek history, gains your trust by appearing to be something good and then harms you.
    (this multiple choice question has been scrambled)
  18. 18. A cookie that is automatically deleted when you close your web browser is a(n) cookie.
    A. First-party
    B. Third-party
    C. Persistent
    D. Session
    D. A session cookie lasts only as long as your browsing session. A persistent cookie is the opposite: it remains after you close the browser.
    (this multiple choice question has been scrambled)
  19. 19. A(n) is a self-transporting application that carries an active payload, such as a virus or Trojan horse.
    A. Botnet
    B. Cookie
    C. Exploit
    D. Worm
    D. A worm spreads itself via a network, email, or social engineering. It typically carries some type of malware with it.
    (this multiple choice question has been scrambled)
  20. 20. One way that an antivirus program detects viruses is through a database it maintains of virus .
    A. Serial numbers
    B. Definitions
    C. Names
    D. Routes
    B. Virus definitions, also called signatures, are used to detect viruses. The antivirus software compares the code in an executable file with the signature of the virus to determine whether the virus is present in that file
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview