In information security, what are the three main goals? (Select the three best answers) -
answer Integrity
Confidentiality
Availability
To protect malicious attacks, what should you think like? - answer Hacker
Tom sends out many e-mails containing secure information to other companies. What
concept should be implemented to prove that Tom did indeed send the e-mails? -
answer on-repudiation
Which of the following does the A in CIA stand for when it comes to IT security? (select
the best answer.) - answer Availability
Which of the following is the greatest risk when it comes to removable storage? -
answer Confidentiality of data
When it comes to information security, what is the I in CIA? - answer Integrity
You are developing a security plan for your organization. Which of the following is an
example of a physical control? – answer ID card
A user receive an e-mail but the e-mail client software says that the digital signature is
invalid and the sender of the e-mail cannot be verified. The would-be recipient is
concerned about which of the following concepts? - answer Integrity
Cloud environments often reuse the same physical hardware (such as hard drives) for
multiple customers. These hard drives are used and reused when customer virtual
machines are created and deleted over time. What security concern does this bring up
implications for? - answer Data confidentiality
Which of the following individuals uses code with little knowledge of how it works? -
answerScript Kiddie
When is a system completely secure? - answerNever
A group of compromised computers that have software installed by a worm or Trojan is
known as which of the following? - answerBotnet
,Which of the following computer security threats can be updated automatically and
remotely? (Select the best answer) - answerZombie
You have been given the task of scanning for viruses on a PC. What is the best of the
following methods? - answerRecovery environment
Which of the following is a common symptom of spyware? - answerPop-up windows
Dan is a network administrator. One day he notices that his DHCP server is flooded with
information. He analyzes it and finds that the information is coming from more than 50
computers on the network. Which of the following is the most likely reason? -
answerWorm
Which of the following is not an example of malicious software? - answerBrowser
Which type of attack uses more than one computer? - answerDDoS
What is a malicious attack that executes at the same time every week? - answerLogic
Bomb
Which of these is a true statement concerning active interception? - answerWhen a
computer is put between a sender and receiver
Which of the following types of scanners can locate a rootkit on a computer? -
answerMalware scanner
Which type of malware does not require a user to execute a program to distribute the
software? - answerWorm
Whitelisting, blacklisting, and closing open relays are all mitigation techniques
addressing what kind of threat? - answerSpam
How do most network-based viruses spread? - answerThrough e-mail
Which of the following defines the difference between a Trojan horse and a worm?
(select the best answer) - answerWorms self-replicate but Trojan horses do not
Which of the following types of viruses hides its code to mask itself? - answerArmored
virus
Which of the following types of malware appears to the user as legitimate but actually
enables unauthorized access to the user's computer? - answerTrojan
Which of the following would be considered detrimental effects of a virus hoax? (select
the two best answers) - answerTechnical support resources are consumed by increased
user calls
,Users are tricked into changing the system configuration
One of your co-workers complains of very slow system performance and says that a lot
of antivirus messages are being displayed. The user admits to recently installing pirated
software and downloading and installing an illegal keygen to activate the software. What
type of malware has affected the user's computer? - answerTrojan
A user complains that they were browsing the Internet when the computer started acting
erratically and crashed. You reboot the computer and notice that performance is very
slow. In addition, after running a netstat command you notice literally hundreds of
outbound connections to various websites, many of which are well-known sites. Which
of the following has happened? - answerThe computer is now part of a botnet
One of your users was not being careful when browsing the Internet. The user was
redirected to a warez site where a number of pop-ups appeared. After clicking one pop-
up by accident, a drive--by download of unwanted software occurred. What does the
download most likely contain? - answerSpyware
You are the network administrator for a small organization without much in the way of
security policies. While analyzing your servers' performance you find various chain
messages have been received by the company. Which type of security control should
you implement to fix the problem? - answerAnti-spam
You are the security administrator for your organization and have just completed a
routine server audit. You did not notice any abnormal activity. However, another
network security analyst finds connections to unauthorized ports from outside the
organization's network. Using security tools, the analyst find hidden processes that are
running on the server. Which of the following has most likely been installed on the
server? - answerRootkit
What are some of the drawbacks to using HIDS instead of a NIDS on a server? (Select
the two best answers) - answerA HIDS may use a lot of resources, which can slow
server performance.
A HIDS cannot detect network attacks
What are two ways to secure the computer within the BIOS? (Select the two best
answers). - answerConfigure a supervisor password
Set the hard drive first in the boot order.
What are the two ways in which you can stop employees from using USB flash drives
(select two). - answerDisable the SB root hub
Disable USB devices in the BIOS
Which of the following are Bluetooth threats? (Select the two best answers.) -
answerBluesnarfing
Bluejacking
, To mitigate risks when users access company e-mail with their smartphone, what
security policy should be implemented? - answerA password should be set on the
smartphone.
Your manager wants you to implement a type of intrusion detection system (IDS) that
can be matched to certain types of traffic patterns. What kind of IDS is this? -
answerSignature based IDS
You are the security administrator for your organization. You want to ensure the
confidentiality of data on mobile devices. What is the best solution? - answerDevice
encyption
You are tasked with implementing a solution that encrypts the CEO's laptop. However,
you are not allowed to purchase additional hardware or software. Which of the following
solutions should you implement? - answerTPM
A smartphone has been lost. You need to ensure 100% that no data can be retrieved
from it. What should you do? - answerRemote wipe
Which of the following is a concern based on a user taking pictures with a smartphone?
- answerGeotagging
A smartphone is an easy target for theft. Which of the following are the best methods to
protect the confidential data on the device? (Select the two best answers.) -
answerEncryption
Remote wipe
Carl is the security administrator for a transportation company. Which of the following
should he encrypt to protect the data on a smartphone? (Select the two best answers.) -
answerInternal memory
Removable memory cards
Which of the following is an advantage of implementing individual file encryption on a
hard drive that already uses whole disk encryption? - answerIndividual encrypted files
will remain encrypted if they are copied to external drives.
You oversee compliance with financial regulations for credit card transactions. You
need to block out certain ports on the individual computers that do these transactions.
What should you implement to best achieve your goal? - answerHost-based firewall
Which of the following would most likely be considered for DLP? - answerUSB mass
storage device
Virtualization technology is often implemented as operating systems and applications
that run in software. Often, it is implemented as a virtual machine. Of the following,
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Dreamer252. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €12,74. Je zit daarna nergens aan vast.