1/28
made by hannah w
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
You are configuring a fleet of Windows 7 laptops for traveling employees, some of whom prefer using USB mice. It is critical that the machines are as secure as possible. What should you configure?
A. Disable USB ports.
B. Require USB device encryption.
C. Enable and configure the Windows firewall.
D. Install and configure antivirus software.
E. Enable a power management scheme.
B,C,D
Michel, an IT security expert, grants permissions to folders on a file server to allow Marketing users to modify Marketing documents. Which information security goal has been satisfied?
Confidentiality
Which of the following organizes the appropriate identification methods from least secure to most secure?
Username and password, smartcard, retinal scan
Ahmid is a software developer for a high-tech company. He creates a program that connects to a chat room and waits to receive commands that will gather personal user information. Ahmid embeds this program into an AVI file for a current popular movie and shares this file on a P2P file-sharing network. Once Ahmid's program is activated as people download and watch the movie, what will be created?
Botnet
You are the founder of Acme Data Mining. The business focuses on retrieving relevant consumer habits from various sources, and that data is then sold to retailers. Because of the amount of data that must be processed, you must implement the fastest possible solution.
Which type of technology should you implement?
NoSQL
What type of password attack involves the use of a dictionary file and modifications of the words in the dictionary file?
Hybrid attack
You are the network administrator for your company. Your manager has asked you to evaluate cloud backup solutions for remote branch offices. To which fundamental security concept does this apply?
Availability
Which TCP/IP protocol is designed to synchronize time between computers?
NTP
Which of the following standards must authenticate computing devices before allowing network access?
IEEE 802.1x
Which of the following are true regarding backdoors?
A. They are malicious code.
B. They allow remote users access to TCP port 25.
C. They are made accessible through rootkits.
D. They provide access to the Windows root account.
A,C