Beruflich Dokumente
Kultur Dokumente
CHAPTER 9
A fingerprint reader is an example of which security technology?
authorization
biometric
keylogging
secureware
smartcard
Which wireless security technology is a good choice when using Cisco equipment in
conjunction with operating systems such as Windows and Linux?
LEAP
WEP
WPA
WTLS
Which type of program causes banners and ads to appear on the desktop without any
user intervention?
adware
spyware
stealth virus
trojan horse
pop-up blocker
spyware
e-mail
Grayware
Is self-replicating.
An employee for a small company inadvertently allows a visitor to see their username
and password. At home, the visitor then uses this information to gain access to the
company network. This is an example of what type of threat?
man-in-the-middle
phishing
physical
social engineering
spoofing
Which is the best procedure to secure a laptop left at the office while the user is away
for an extended period of time?
Secure by a security cable wrapped around the leg of the user's desk.
Put the laptop in a desk drawer in the locked office of the user.
Place the laptop in a locked security cage designed to store computer
equipment.
Place the laptop in the office of the supervisor.
What is the best method for a company to secure data being transmitted across the
Internet between remote sites?
Use plain text in an e-mail.
Which threat to security uses traffic from zombie computers to overwhelm servers?
DoS
DDoS
phishing
spoofing
SYN flood
Which two statements are true about username and password standards? (Choose
two.)
The username naming convention should be kept simple.
When setting up a new wireless access point, which basic security measure should be
taken?
Disable SSID broadcast.
What must be done to ensure that the anti-virus software on a computer is able to
detect and eradicate the most recent viruses?
Download the latest signature files on a regular basis.
service packs
security patches
BIOS upgrades
DirectX updates
WEP64 uses a 64-bit encryption key, and WEP128 uses a 128-bit key.
A bank is upgrading the hard drives in a server. What should be done to the old hard
drives to permanently remove any confidential data?
Delete the files containing the confidential data.
A technician has downloaded the latest Windows XP updates from the Microsoft
website. What should the technician do before installing the updates?
Create a restore point.
phishing
spyware
trojan
Which type of software is downloaded onto the computer of a user without the
knowledge of the user and causes information about various products to be displayed
on the user's monitor?
adware
free software
grayware
spyware