Windows Practice Test

0

Q&A

 

7.

1.

Regarding access control, a(n) ____ is a specific resource, such as a file or a hardware device.
Student Response Feedback
operation
Student Response  object
asset
subject
Score: 0.5/0.5

2.

Regarding access control, a(n) ____ is a user or a process functioning on behalf of the user who attempts to access an object.
Student Response Feedback
Student Response  subject
object
operation
asset
Score: 0.5/0.5

3.

Regarding access control, an example of a(n) ____ is when a user attempts to delete a file.
Student Response Feedback
subject
object
asset
Student Response  operation
Score: 0.5/0.5

4.

In the ____ model, the end user cannot implement, modify, or transfer any controls.
Student Response Feedback
Role Based Access Control (RBAC)
Discretionary Access Control (DAC)
Rule Based Access Control (RBAC)
Student Response  Mandatory Access Control (MAC)
Score: 0.5/0.5

5.

With the ____ model a subject has total control over any objects that he or she owns, along with the programs that are associated with those objects.
Student Response Feedback
RBAC
RuBAC
MAC
Student Response  DAC
Score: 0.5/0.5

6.

The ____ model is considered a more “real world” approach than the other models to structuring access control.
Student Response Feedback
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Rule Based Access Control (RBAC)
Student Response  Role Based Access Control (RBAC)
Score: 0.5/0.5

7.

The ____ model can dynamically assign roles to subjects based on a set of rules defined by a custodian.
Student Response Feedback
Role Based Access Control (RBAC)
Student Response  Rule Based Access Control (RBAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Score: 0.5/0.5

8.

Known as ____, this practice requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.
Student Response Feedback
least privilege
implicit deny
job rotation
Student Response  separation of duties
Score: 0.5/0.5

9.

The principle of ____ in access control means that each user should be given only the minimal amount of privileges necessary to perform his or her job function.
Student Response Feedback
Student Response  least privilege
job rotation
separation of duties
implicit deny
Score: 0.5/0.5

10.

____ in access control means that if a condition is not explicitly met, then it is to be rejected.
Student Response Feedback
job rotation
Separation of duties
Student Response  Implicit deny
least privilege
Score: 0.5/0.5

11.

Generally a ____ is used to configure settings for systems that are not part of Active Directory.
Student Response Feedback
Group Policy
Domain Group Policy
Student Response  Local Group Policy
Group Policy Object
Score: 0.5/0.5

12.

____ accounts are user accounts that remain active after an employee has left an organization.
Student Response Feedback
Ghost
Student Response  Orphaned
Phantom
Floating
Score: 0.5/0.5

13.

____ is the process of setting a user’s account to expire.
Student Response Feedback
Account restriction
Time of day restriction
Student Response  Account expiration
Login expiration
Score: 0.5/0.5

14.

A ____ is a secret combination of letters and numbers that only the user knows.
Student Response Feedback
Student Response  password
smartcard
RFID tag
badge
Score: 0.5/0.5

15.

A ____ attack begins with the attacker creating hashes of common dictionary words, and compares those hashed dictionary words against those in a stolen password file.
Student Response Feedback
rainbow table
brute force
birthday
Student Response  dictionary
Score: 0.5/0.5

16.

To address the security issues in the LM hash, Microsoft introduced the ____ hash.
Student Response Feedback
ELM
NETLM
VLM
Student Response  NTLM
Score: 0.5/0.5

17.

A ____ lock, also known as the key-in-knob lock, is the easiest to use because it requires only a key for unlocking the door from the outside.
Student Response Feedback
cipher
deadbolt
tailgate
Student Response  preset
Score: 0.5/0.5

18.

Known as a ____ lock, this lock extends a solid metal bar into the door frame for extra security.
Student Response Feedback
cipher
tailgate
preset
Student Response  deadbolt
Score: 0.5/0.5

19.

____ locks are combination locks that use buttons that must be pushed in the proper sequence to open the door.
Student Response Feedback
Tailgate
Deadbolt
Preset
Student Response  Cipher
Score: 0.5/0.5

20.

A ____ is a security device that monitors and controls two interlocking doors to a small room (a vestibule) that separates a nonsecured area from a secured area.
Student Response Feedback
cipher lock
tailgate sensor
Student Response  mantrap
CCTV
Score: 0.5/0.5

 

8.

1.

____ is the presentation of credentials or identification, typically performed when logging on to a system.
Student Response Feedback
Authentication
Authorization
Access
Student Response  Identification
Score: 0.5/0.5

2.

____ is the verification of the credentials to ensure that they are genuine and not fabricated.
Student Response Feedback
Student Response  Authentication
Authorization
Identification
Access
Score: 0.5/0.5

3.

____ is granting permission for admittance.
Student Response Feedback
Identification
Student Response  Authorization
Authentication
Access
Score: 0.5/0.5

4.

____ is the right to use specific resources.
Student Response Feedback
Authentication
Identification
Student Response  Access
Authorization
Score: 0.5/0.5

5.

A ____ fingerprint scanner requires the user to place the entire thumb or finger on a small oval window on the scanner.
Student Response Feedback
cognitive
physical
Student Response  static
dynamic
Score: 0.5/0.5

6.

A ____ fingerprint scanner has a small slit or opening. Instead of placing the entire finger on the scanner the finger is swiped across the opening.
Student Response Feedback
Student Response  dynamic
physical
cognitive
static
Score: 0.5/0.5

7.

____ time is the time it takes for a key to be pressed and then released.
Student Response Feedback
Student Response  Dwell
Type
Flight
Hit
Score: 0.5/0.5

8.

____, such as using an OTP (what a person has) and a password (what a person knows), enhances security, particularly if different types of authentication methods are used.
Student Response Feedback
Student Response  Two-factor authentication
Standard biometrics
Cognitive biometrics
Federated identity management
Score: 0.5/0.5

9.

____ requires that a user present three different types of authentication credentials.
Student Response Feedback
Cognitive biometrics
Two-factor authentication
Student Response  Three-factor authentication
Behavioral biometrics
Score: 0.5/0.5

10.

____ is a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Student Response Feedback
FMI
Windows Live ID
OpenID
Student Response  Windows CardSpace
Score: 0.5/0.5

11.

____ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
Student Response Feedback
Student Response  Windows CardSpace
OpenID
.NET Passport
Windows Live ID
Score: 0/0.5

12.

____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Student Response Feedback
LDAP
TACACS+
Student Response  Kerberos
RADIUS
Score: 0.5/0.5

13.

____ is an industry standard protocol specification that forwards username and password information to a centralized server.
Student Response Feedback
Kerberos
RADIUS
Student Response  TACACS+
LDAP
Score: 0.5/0.5

14.

The International Organization for Standardization (ISO) created a standard for directory services known as ____.
Student Response Feedback
X.589
X.400i
Student Response  X.500
X.459
Score: 0.5/0.5

15.

The ____, sometimes called X.500 Lite, is a simpler subset of DAP.
Student Response Feedback
TACACS+
RADIUS
Kerberos
Student Response  LDAP
Score: 0.5/0.5

16.

The management protocol of IEEE 802.1x that governs the interaction between the system, authenticator, and RADIUS server is known as the ____.
Student Response Feedback
Student Response  EAP
X.500
LDAP
TACACS+
Score: 0.5/0.5

17.

____ is a very basic authentication protocol that was used to authenticate a user to a remote access server or to an Internet service provider (ISP).
Student Response Feedback
EAP-MD5
MS-CHAP
EAP-TLS
Student Response  PAP
Score: 0.5/0.5

18.

____ refers to any combination of hardware and software that enables access to remote users to a local internal network.
Student Response Feedback
VPN
Student Response  RAS
EAP
LDAP
Score: 0.5/0.5

19.

A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.
Student Response Feedback
EAP
LDAP
Student Response  VPN
RAS
Score: 0.5/0.5

20.

A(n) ____ is the end of the tunnel between VPN devices.
Student Response Feedback
Student Response  endpoint
demux
concentrator
VPN server
Score: 0.5/0.5

 

9.

1.

In information security, a ____ is the likelihood that a threat agent will exploit a vulnerability.
Student Response Feedback
weakness
threat
hole
Student Response  risk
Score: 0.5/0.5

2.

____ generally denotes a potential negative impact to an asset.
Student Response Feedback
Threat
Vulnerability
Student Response  Risk
Weakness
Score: 0.5/0.5

3.

The goal of ____ is to better understand who the attackers are, why they attack, and what types of attacks might occur.
Student Response Feedback
vulnerability modeling
risk modeling
Student Response  threat modeling
weakness modeling
Score: 0.5/0.5

4.

Known as ____, this in effect takes a snapshot of the security of the organization as it now stands.
Student Response Feedback
Student Response  vulnerability appraisal
risk identification
risk mitigation
threat identification
Score: 0.5/0.5

5.

The ____ is the expected monetary loss every time a risk occurs.
Student Response Feedback
Student Response  Single Loss Expectancy (SLE)
Annualized Loss Expectancy (ALE)
Asset Value (AV)
Exposure Factor (EF)
Score: 0.5/0.5

6.

The ____ is the expected monetary loss that can be expected for an asset due to a risk over a one-year period.
Student Response Feedback
Exposure Factor (EF)
Student Response  Annualized Loss Expectancy (ALE)
Asset Value (AV)
Single Loss Expectancy (SLE)
Score: 0.5/0.5

7.

In a ____, the risk is spread over all of the members of the pool.
Student Response Feedback
Student Response  risk retention pool
joined risk
retained risk
cooperative risk
Score: 0.5/0.5

8.

Most communication in TCP/IP involves the exchange of information between a program running on one device (known as a ____) and the same or a corresponding process running on another device.
Student Response Feedback
Student Response  process
socket
port
scanner
Score: 0.5/0.5

9.

TCP/IP uses a numeric value as an identifier to applications and services on the systems. These are known as the ____.
Student Response Feedback
socket
process
Student Response  port number
protocol
Score: 0.5/0.5

10.

____ are typically used to determine the state of a port to know what applications are running and could be exploited.
Student Response Feedback
Student Response  Port scanners
Port testers
Network scanners
Network testers
Score: 0.5/0.5

11.

A(n) ____ port means that the application or service assigned to that port is listening.
Student Response Feedback
listening
closed
blocked
Student Response  open
Score: 0.5/0.5

12.

A(n) ____ port indicates that no process is listening at this port.
Student Response Feedback
blocked
Student Response  closed
open
listening
Score: 0.5/0.5

13.

A(n) ____ port means that the host system does not reply to any inquiries to this port number.
Student Response Feedback
listening
closed
Student Response  blocked
open
Score: 0.5/0.5

14.

____ are software tools that can identify all the systems connected to a network.
Student Response Feedback
Student Response  Network mappers
ICMP mappers
ICMP scanners
Port scanners
Score: 0.5/0.5

15.

____ provides support to IP in the form of ICMP messages that allow different types of communication to occur between IP devices.
Student Response Feedback
SMTP
SNMP
HTTP
Student Response  ICMP
Score: 0.5/0.5

16.

The key feature of a protocol analyzer is that it places the computer’s network interface card (NIC) adapter into ____, meaning that NIC does not ignore packets intended for other systems and shows all network traffic.
Student Response Feedback
traffic mode
Student Response  promiscuous mode
sniffing mode
listening mode
Score: 0.5/0.5

17.

____ is a generic term that refers to a range of products that look for vulnerabilities in networks or systems.
Student Response Feedback
Network mapper
Ping
Student Response  Vulnerability scanner
Port scanner
Score: 0.5/0.5

18.

____ is a “common language” for the exchange of information regarding security vulnerabilities.
Student Response Feedback
XML
HTML
SQL
Student Response  OVAL
Score: 0.5/0.5

19.

____ programs use the file of hashed passwords and then attempts to break the hashed passwords offline.
Student Response Feedback
Network mapper
Port scanner
Student Response  Password cracker
ICMP scanner
Score: 0.5/0.5

20.

____ is a method of evaluating the security of a computer system or network by simulating a malicious attack instead of just scanning for vulnerabilities.
Student Response Feedback
Port scanning
Network mapping
Student Response  Penetration testing
Vulnerability scanning
Score: 0.5/0.5

 

10.

1.

____ is the process of assigning and revoking privileges to objects; that is, it covers the procedures of managing object authorizations.
Student Response Feedback
Student Response  Privilege management
Privilege configuration
Privilege assignment
Privilege auditing
Score: 0.5/0.5

2.

The ____ is typically defined as the person responsible for the information, who determines the level of security needed for the data, and delegates security duties as required.
Student Response Feedback
manager
custodian
Student Response  owner
guardian
Score: 0.5/0.5

3.

The ____ is the individual to whom day-to-day actions have been assigned by the owner and who periodically reviews security settings and maintains records of access by end users.
Student Response Feedback
manager
guardian
Student Response  custodian
owner
Score: 0.5/0.5

4.

The Windows file and folder ____ permission allows files or folders to be opened as read-only and to be copied.
Student Response Feedback
Student Response  Read
Modify
Write
Read and Execute
Score: 0.5/0.5

5.

The Windows file and folder ____ permission allows the creation of files and folders, and allows data to be added to or removed from files.
Student Response Feedback
Modify
Read
Read and Execute
Student Response  Write
Score: 0.5/0.5

6.

The Microsoft ____ infrastructure is a mechanism to centrally configure and secure a common set of computer and user configurations and security settings to Windows servers, desktops, and users in an AD.
Student Response Feedback
Security Template
Auditing
Baseline
Student Response  Group Policy
Score: 0.5/0.5

7.

____ is part of the pre-trial phase of a lawsuit in which each party through the law of civil procedure can request documents and other evidence from other parties or can compel the production of evidence by using a subpoena.
Student Response Feedback
Interview
Retention
Interrogation
Student Response  Discovery
Score: 0.5/0.5

8.

ILM strategies are typically recorded in ____ policies.
Student Response Feedback
group
data confidentiality
Student Response  storage and retention
user security
Score: 0.5/0.5

9.

____ assigns a level of business importance, availability, sensitivity, security and regulation requirements to data.
Student Response Feedback
Security auditing
Usage classification
Usage auditing
Student Response  Data classification
Score: 0.5/0.5

10.

____ means permissions given to a higher level “parent” will also be inherited by a lower level “child.”
Student Response Feedback
Transition
Delegation
Classification
Student Response  Inheritance
Score: 0.5/0.5

11.

____ is the process for generating, transmitting, storing, analyzing, and disposing of computer security log data.
Student Response Feedback
Student Response  Log management
Event management
Event auditing
Log auditing
Score: 0.5/0.5

12.

____ servers are intermediate hosts through which Web sites are accessed.
Student Response Feedback
HIPS
NIDS
Authentication
Student Response  Proxy
Score: 0.5/0.5

13.

____ logs can be used to determine whether new IP addresses are attempting to probe the network and if stronger firewall rules are necessary to block them.
Student Response Feedback
DNS
Authentication servers
Student Response  Firewall
Proxy servers
Score: 0.5/0.5

14.

____ are operational actions that are performed by the operating system, such as shutting down the system or starting a service.
Student Response Feedback
Student Response  System events
System functions
System calls
System processes
Score: 0.5/0.5

15.

Logs based on ____ are the second common type of security-related operating system logs.
Student Response Feedback
Student Response  audit records
event records
system events
event logs
Score: 0.5/0.5

16.

____ refers to a methodology for making changes and keeping track of those changes, often manually.
Student Response Feedback
Log management
Event management
Student Response  Change management
Event auditing
Score: 0.5/0.5

17.

____ monitoring is designed for detecting statistical anomalies.
Student Response Feedback
Signature-based
Student Response  Anomaly-based
Behavior-based
Time-based
Score: 0.5/0.5

18.

____ monitoring compares activities against a predefined signature.
Student Response Feedback
Behavior-based
Time-based
Anomaly-based
Student Response  Signature-based
Score: 0.5/0.5

19.

A ____ baseline is a reference set of data established to create the “norm” of performance for a system or systems.
Student Response Feedback
system
monitoring
Student Response  performance
configuration
Score: 0.5/0.5

20.

A ____ monitor is typically a low-level system program that uses a notification engine designed to monitor and track down hidden activity on a desktop system, server, or even personal digital assistant (PDA) or cell phone.
Student Response Feedback
Student Response  system
baseline
performance
behavior
Score: 0.5/0.5

 

11.

1.

Changing the original text to a secret message using cryptography is known as ____.
Student Response Feedback
decryption
cleartext
Student Response  encryption
ciphertext
Score: 0.5/0.5

2.

Data that is in an unencrypted form is called ____ data.
Student Response Feedback
caesartext
Student Response  cleartext
hidetext
plaintext
Score: 0.5/0.5

3.

____, also called a one-way hash, is a process for creating a unique “signature” for a set of data.
Student Response Feedback
Digital signing
Student Response  Hashing
Decrypting
Encrypting
Score: 0.5/0.5

4.

____ is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations.
Student Response Feedback
SHA-1
MD5
Student Response  Whirlpool
MD2
Score: 0.5/0.5

5.

Symmetric encryption is also called ____ key cryptography.
Student Response Feedback
open
Student Response  private
close
public
Score: 0.5/0.5

6.

The simplest type of stream cipher is a ____ cipher. It simply substitutes one letter or character for another.
Student Response Feedback
transposition
Student Response  substitution
homoalphabetic
permutation
Score: 0.5/0.5

7.

A ____ cipher rearranges letters without changing them.
Student Response Feedback
monoalphabetic
substitution
homoalphabetic
Student Response  transposition
Score: 0.5/0.5

8.

A ____ cipher manipulates an entire block of plaintext at one time.
Student Response Feedback
Student Response  block
stream
transposition
substitution
Score: 0.5/0.5

9.

____ was approved by the NIST in late 2000 as a replacement for DES.
Student Response Feedback
3DES
Student Response  AES
Twofish
Blowfish
Score: 0.5/0.5

10.

____ is a block cipher that processes blocks of 64 bits.
Student Response Feedback
MD5
RC4
SHA-1
Student Response  RC2
Score: 0.5/0.5

11.

The ____ algorithm dates back to the early 1990s and is used in European nations.
Student Response Feedback
Blowfish
Student Response  IDEA
Twofish
RC4
Score: 0.5/0.5

12.

____ encryption uses two keys instead of one. These keys are mathematically related and are known as the public key and the private key.
Student Response Feedback
Symmetric
Student Response  Asymmetric
Private
Open
Score: 0.5/0.5

13.

The asymmetric algorithm ____ was published in 1977 and patented by MIT in 1983.
Student Response Feedback
Diffie-Hellman
Student Response  RSA
SHA
AES
Score: 0.5/0.5

14.

The strength of the ____ algorithm is that it allows two users to share a secret key securely over a public network.
Student Response Feedback
Student Response  Diffie-Hellman
RSA
AES
DES
Score: 0.5/0.5

15.

A similar program known as ____ is a PGP open-source product.
Student Response Feedback
PGPnix
Student Response  GPG
FreePGP
PGPx
Score: 0.5/0.5

16.

Microsoft’s ____ is a cryptography system for Windows operating systems that use the Windows NTFS file system.
Student Response Feedback
AES
Student Response  EFS
GPG
PGP
Score: 0.5/0.5

17.

Cryptography can also be applied to entire disks. This is known as ____ encryption.
Student Response Feedback
Student Response  whole disk
symmetric
EFS
file system
Score: 0.5/0.5

18.

To protect data stored on a hard drive, Microsoft Windows Vista includes ____ drive encryption.
Student Response Feedback
Student Response  BitLocker
TPM
AES
IDEA
Score: 0.5/0.5

19.

____ is a hardware-enabled data encryption feature.
Student Response Feedback
Student Response  BitLocker
DES
AES
EFS
Score: 0.5/0.5

20.

____ is essentially a chip on the motherboard of the computer that provides cryptographic services.
Student Response Feedback
BitLocker
EFS
Student Response  TPM
AES
Score: 0.5/0.5

 

1.

A Class ____ fire includes common combustibles.
Student Response Feedback
B
Student Response  A
C
D
Score: 0.5/0.5

2.

____ systems spray the fire area with pressurized water.
Student Response Feedback
Student Response  Water sprinkler
Chemical agent
Dry chemical
Clean agent
Score: 0.5/0.5

3.

____ systems disperse a fine, dry powder over the fire.
Student Response Feedback
Clean chemical
Clean agent
Water sprinkler
Student Response  Dry chemical
Score: 0.5/0.5

4.

____ fire suppression systems do not harm people, documents, or electrical equipment in the room.
Student Response Feedback
Student Response  Clean agent
Water sprinkler
Dry chemical
Clean sprinkler
Score: 0.5/0.5

5.

In a(n) ____ server cluster, a standby server exists only to take over for another server in the event of its failure.
Student Response Feedback
network
symmetric
redundant
Student Response  asymmetric
Score: 0.5/0.5

6.

In a(n) ____ server cluster, every server in the cluster performs useful work. If one server fails, the remaining servers continue to perform their normal work as well as that of the failed server.
Student Response Feedback
redundant
network
Student Response  symmetric
asymmetric
Score: 0.5/0.5

7.

A system of hard drives based on redundancy can be achieved through using a technology known as ____, which uses multiple hard disk drives for increased reliability and performance.
Student Response Feedback
ESD
VPN
MTBF
Student Response  RAID
Score: 0.5/0.5

8.

____ partitions the storage space of each hard drive into smaller sections, which can be as small as 512 bytes or as large as several megabytes.
Student Response Feedback
Duplexing
Mirroring
Student Response  Striping
Segmenting
Score: 0.5/0.5

9.

Disk ____ involves connecting multiple drives in the server to the same disk controller card.
Student Response Feedback
stripping
segmenting
duplexing
Student Response  mirroring
Score: 0.5/0.5

10.

Instead of having a single disk controller card that is attached to all hard drives, disk ____ has separate cards for each disk.
Student Response Feedback
segmenting
stripping
Student Response  duplexing
mirroring
Score: 0.5/0.5

11.

RAID Level 5 distributes ____ data (a type of error checking) across all drives instead of using a separate drive to hold the parity error checking information.
Student Response Feedback
mirroring
Student Response  parity
segmenting
stripping
Score: 0.5/0.5

12.

A(n) ____ UPS is always running off its battery while the main power runs the battery charger.
Student Response Feedback
battery
Student Response  on-line
mirroring
off-line
Score: 0.5/0.5

13.

A ____ site is generally run by a commercial disaster recovery service that allows a business to continue computer and network operations to maintain business continuity.
Student Response Feedback
warm
cool
cold
Student Response  hot
Score: 0.5/0.5

14.

A ____ site has all of the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data.
Student Response Feedback
cold
Student Response  warm
cool
hot
Score: 0.5/0.5

15.

Backup software can internally designate which files have already been backed up by setting a(n) ____ in the properties of the file.
Student Response Feedback
backup bit
Student Response  archive bit
archive sector
backup sector
Score: 0.5/0.5

16.

The ____ is defined as the maximum length of time that an organization can tolerate between backups.
Student Response Feedback
RTO
D2D
D2D2T
Student Response  RPO
Score: 0.5/0.5

17.

The ____ is simply the length of time it will take to recover the data that has been backed up.
Student Response Feedback
D2D2T
D2D
Student Response  RTO
RPO
Score: 0.5/0.5

18.

An alternative to using magnetic tape is to back up to magnetic disk, such as a large hard drive or RAID configuration. This is known as ____.
Student Response Feedback
Student Response  D2D
RTO
RPO
D2D2T
Score: 0.5/0.5

19.

A solution that combines the best of magnetic tape and magnetic disk is ____. This technology uses the magnetic disk as a temporary storage area.
Student Response Feedback
Student Response  D2D2T
RTO
RPO
D2D
Score: 0.5/0.5

20.

____ is the application of science to questions that are of interest to the legal profession.
Student Response Feedback
Chain of custody
RTO
RPO
Student Response  Forensics
Score: 0.5/0.5

 

14

1.

At its core, a(n) ____ policy is a document that outlines the protections that should be enacted to ensure that the organization’s assets face minimal risks.
Student Response Feedback
acceptable use
change management
safety
Student Response  security
Score: 0.5/0.5

2.

A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.
Student Response Feedback
Student Response  standard
guideline
policy
recommendation
Score: 0.5/0.5

3.

A ____ is a collection of suggestions that should be implemented.
Student Response Feedback
Student Response  guideline
recommendation
standard
policy
Score: 0.5/0.5

4.

A ____ is a document that outlines specific requirements or rules that must be met.
Student Response Feedback
Student Response  policy
guideline
standard
recommendation
Score: 0.5/0.5

5.

____ determines the items that have a positive economic value and may include data, hardware, personnel, physical assets, and software.
Student Response Feedback
Threat identification
Student Response  Asset identification
Vulnerability appraisal
Risk assessment
Score: 0.5/0.5

6.

____ takes a snapshot of the security of the organization as it now stands.
Student Response Feedback
Risk assessment
Risk mitigation
Student Response  Vulnerability appraisal
Threat identification
Score: 0.5/0.5

7.

____ involves determining the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization.
Student Response Feedback
Risk mitigation
Student Response  Risk assessment
Vulnerability appraisal
Asset identification
Score: 0.5/0.5

8.

A(n) ____ policy establishes guidelines for effectively reducing the threat of computer viruses on the organization’s network and computers.
Student Response Feedback
acceptable encryption
dial-in access
Student Response  anti-virus
automated forwarded e-mail
Score: 0.5/0.5

9.

A(n) ____ policy outlines the requirements and provides the authority for an information security team to conduct audits and risk assessments, investigate incidents, to ensure conformance to security policies, or to monitor user activity.
Student Response Feedback
database credentials coding
automatically forwarded e-mail
Student Response  audit vulnerability scanning
analog line
Score: 0.5/0.5

10.

A(n) ____ policy defines requirements for storing and retrieving database usernames and passwords.
Student Response Feedback
dial-in access
Student Response  database credentials coding
e-mail retention
analog line
Score: 0.5/0.5

11.

A(n) ____ policy helps employees determine what information sent or received by e-mail should be retained and for how long.
Student Response Feedback
Student Response  e-mail retention
router security
information sensitivity
extranet
Score: 0.5/0.5

12.

A(n) ____ policy establishes requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organization’s network.
Student Response Feedback
demilitarized zone security
Student Response  VPN security
extranet
server security
Score: 0.5/0.5

13.

Many organizations have a ____ policy that outlines how the organization uses personal information it collects.
Student Response Feedback
Student Response  personally identifiable information
security-related human resource
password management and complexity
disposal and destruction
Score: 0.5/0.5

14.

Most organizations have a ____ policy that addresses the disposal of resources that are considered confidential.
Student Response Feedback
security-related human resource
Student Response  disposal and destruction
password management and complexity
personally identifiable information
Score: 0.5/0.5

15.

A ____ policy is designed to produce a standardized framework for classifying information assets.
Student Response Feedback
change management
Student Response  classification of information
service level agreement
disposal and destruction
Score: 0.5/0.5

16.

____ refers to a methodology for making changes and keeping track of those changes, often manually.
Student Response Feedback
Service level agreement
Destruction and disposal
Student Response  Change management
Classification of information
Score: 0.5/0.5

17.

____ are a person’s fundamental beliefs and principles used to define what is good, right, and just.
Student Response Feedback
Norms
Student Response  Values
Ethics
Morals
Score: 0.5/0.5

18.

____ are values that are attributed to a system of beliefs that help the individual distinguish right from wrong.
Student Response Feedback
Student Response  Morals
Ethics
Norms
Codes
Score: 0.5/0.5

19.

____ relies on tricking and deceiving someone to provide secure information.
Student Response Feedback
Virus
Student Response  Social engineering
Worm
Trojan horse
Score: 0.5/0.5

20.

One of the most common forms of social engineering is ____, or sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.
Student Response Feedback
pharming
dumpster diving
computer hoax
Student Response  phishing
Score: 0.5/0.5

 

Follow us on Twitter, subscribe to our Facebook Page, find us on LinkedIn, circle us on Google+