CIST 1601 Final Exam Spring 2020

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

1. Which is a form of cryptography provides confidentiality with a weak form of authentication or integrity?

Symmetric key encryption

Asymmetric Key encryption

Hash algorithm

Key distribution

Symmetric-key encryption

2
New cards

2. What is the main difference between a worm and a virus?

A worm tries to the steal information, while I virus tries to destroy data.

A worm is restricted to one system, while a virus can spread from system to system.

A worm can replace itself, while a virus requires a host for distribution.

A worm requires an execution mechanism to start while a virus can start itself

A worm can replicate itself, while a virus requires a host for distribution.

3
New cards

3. What type of malware monitors your actions?

Virus

Worm

Spyware

Trojan horse

Spyware

4
New cards

4. A collection of zombie computers have been set up to collect personal information. What type of malware to the zombie computers represent?

Trojan Horse

Logic Bomb

Botnet

Spyware

Botnet

5
New cards

5. Which is a program that appears to be a legitimate application, utility, game, or screensaver and performs malicious activities surreptitiously?

Worm

ActiveX Control

Outook Express

Trojan horse

Trojan Horse

6
New cards

6. Which/what of the following is a characteristic of a virus?

Is remotely controlled by a central command

Capable of replicating itself

Requires an activation mechanism to run

Requires administrative privileges to install

Requires an activation mechanism to run.

7
New cards

7. You have heard about a new malware program that presents itself to users as a virus scanner. When users run the software, it installs itself as a hidden program that has administrator access to various operating system components. The program then track system activity and allows an attacker to remotely gain administrator access to the computer. Which of the following terms best describes this software?

Which of the following is undetectable software that allows admin level access?

Botnet

Privilege escalation

Rootkit

Spyware

Rootkit

8
New cards

8. What is the primary distinguishing characteristic between a worm and a logic bomb?

Incidental damage to resources

Masquerades as a useful program

Self replication

Spreads via email

Self-replication

9
New cards

9. What is another name for a logic bomb?

Asynchronous attack

Trojan horse

Pseudo-flaw

DNS poisoning

Asynchronous Attack

10
New cards

10. Which of the following statements about the use of antivirus software is correct?

-Antivirus software should be configured to download updated virus definition files as soon as they become available.

-Once installed, antivirus software needs to be updated on a monthly basis.

-If servers on the network have antivirus software installed, workstations do not need antivirus software installed.

-If you install antivirus software, you no longer need a firewall on your network.

Anti-virus software should be configured to download updated virus definition files as soon as they become available.

11
New cards

11. Your organization is formulating a bring your own device (BYOD) security policy for mobile devices. Which of the following statements should be considered as you formulate your policy?

-You can't use domain-based group policies to enforce security settings on mobile devices.

-Mobile devices are immune to malware threats.

-Anti-malware software isn't available for most mobile device operating systems.

-It is difficult for users to connect personal mobile devices to your organizations corporate network.

You can't use domain-based group policies to enforce security settings on mobile devices.

12
New cards

12. Which of the following is defined as a contract that prescribes the technical support or business parameters a provider will bestowed to its client?

Service level agreement

Mutual aid agreement

Final audit report

Certificate practice statement

Service level agreement (SLA)

13
New cards

13. HIPAA is a set of federal regulations that define security guidelines. What do HIPAA guidelines protect?

Integrity

Availability

Non-repudiation

Privacy

Privacy

14
New cards

14. What is a service level agreement (SLA)?

A guarantee of a specific level of service

A contract with legal entity to limit your asset loss liability

An agreement to support another company in the event of a disaster

A contract with an ISP for a specific level of bandwidth

A guarantee of a specific level of service

15
New cards

15. You want to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?

Change management

Resource allocation

Service Level Agreement (SLA)

Acceptable use

Change management

16
New cards

16. What is the most effective way to improve or enforce security in any environment?

Providing user awareness training

Disabling Internet access

Requiring two-factor authentication

Enforcing account lockout

providing User awareness training

17
New cards

17. Change control should be used to oversee and manage changes over what aspect of an organization?

● Physical environment

● Every aspect

● Personnel and policies

● IT hardware and software

Every aspect

18
New cards

18. You have recently discovered that a network attack is compromised your database server. The attacker may have stolen customer credit card numbers. You have stopped the attack and implemented security measures to prevent the same incident from occurring in the future. What else might you legally be required to do?

Implement training for employees who handle personal information

Perform additional investigations to identify the attacker

Contact your customers let them know about the security breach

Delete personally identifiable information from your computers

Contact your customers to let them know of the security breach

19
New cards

19. What is the primary countermeasure to social engineering?

Traffic filters

A written security policy

Heavy management oversight

Employee awareness training

Employee awareness training

20
New cards

20. Which of the following attacks tricks victims into providing confidential information through emails or websites that impersonate an online entity that the victim trusts?

Man-in-the-middle

Phishing

Adware

Session hijacking

Phishing

21
New cards

21. Dumpster diving is a low-tech way to gather information that may be useful in gaining unauthorized access or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?

Create a strong password policy

Secure all terminals with screensaver passwords

Mandate the use of Integrated Windows Authentication

Establish and enforce a document destruction policy

Establish and enforce a document destruction policy

22
New cards

22. Which of the following social engineering attacks his Voice over IP (VoIP) to gain sensitive information?

Spear phishing

Masquerading

Vishing

Taligating

Vishing

23
New cards

23. You are about to enter your office building through a back entrance. A man dressed as a plumber asked you to let him and so he can fix the restroom. What should you do?

-Let him in.

-Direct him to the front entrance and instruct him to check in with the receptionist.

-Tell him no and quickly close the door.

-Let them in and help them find the restroom, then let them work.

Direct him to the front entrance and instruct him to check in with the receptionist.

24
New cards

24. Which of the following is not an example of a physical barrier access control mechanism?

One-time passwords

Fences

Mantrap

Biometric locks

One time passwords

25
New cards

25. Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smartcards to gain entry?

Use weight scales

Install security cameras

Use key locks rather than electronic locks

Deploy a mantrap

Deploy a mantrap

26
New cards

26. What is the primary benefit of CCTV?

Increase security protection throughout an environment

Reduce the need for locks and sensors on doors

Expand the area visible by security guards

Provide a corrective control

Expands the area visible by security guards

27
New cards

27. Which of the following is not a benefit of physical security?

Sensitive data is protected from unauthorized access

Untrained employees cannot miss-use equipment

Employee passwords are stronger

Terrorists cannot walk in off the street and change the network configuration

Employee passwords are stronger.

28
New cards

28. An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions?

Replay

Impersonation

Social engineering

Privilege escalation

Privilege escalation

29
New cards

29. When/while developing a network application, a programmer adds functionality that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code in shipping the application. What type of security weakness does this represent?

Buffer overflow

Weak passwords

Privilege escalation

Backdoor

Backdoor

30
New cards

30. What common design feature among instant messaging clients make them less secure than other means of communicating over the Internet?

Freely available for use

Real-time communication

Peer-to-peer networking

Transfer of text and files

Peer-to-peer networking

31
New cards

31. What type of attack is most likely to succeed with communications between instant messaging clients?

Sniffing

DNS poisoning

Brute force password attack

Denial of service

Sniffing

32
New cards

32. Which of the following attacks, is successful, causes a switch to function like a hub?

Replay

ARP poisoning

MAC flooding

MAC spoofing

MAC flooding

33
New cards

33. Which of the following switch attacks associates the attackers MAC address with the IP address of the victims devices?

Cross-site scripting

DNS poisoning

MAC spoofing

ARP spoofing/poisoning

ARP spoofing/poisoning

34
New cards

34. Which is a typical goal of MAC spoofing?

Rerouting local traffic to a specified destination

Causing a switch to enter fail open mode

Causing incoming packets to broadcast to all ports

Bypassing 802.1x port-based security

Bypassing 802.1x port based security

35
New cards

Which of the following is an appropriate definition of a VLAN?

-A logical grouping of devices based on service need, protocol, or other criteria.

-A device used to filter WAN traffic

-A physical collection of devices that belong together and are connected to the same wire or physical switch

-A device used to route traffic between separate networks

A logical grouping of devices based on service need, protocol, or other criteria

36
New cards

36. Which of the following can make passwords useless on a router?

Not controlling physical access to the router

Storing the router configuration file to a secure location

Using SSH to connect to a router remotely

Using the MD5 hashing algorithm to encrypt the password

Not controlling physical access to the router

37
New cards

37. You often travel away from the office. While traveling, you would like to use a modem on your laptop to connect directly to a server in your office and access files. You want the connection to be as secure as possible. What type of connection will you need?

Remote access

Internet

Virtual Private Network

Intranet

Remote access

38
New cards

38. RADIUS is primarily used for what purpose?

-managing RAID fault-tolerant drive configurations

-Controlling entry gate access using proximity sensors

-Authenticating remote clients before access to the network is granted

-Managing access to a network over a VPN

Authenticating remote clients before access to the network is granted

39
New cards

39. Which of the following cloud computing solutions delivers software applications to a client either over the Internet or a local area network?

SaaS

DaaS

IaaS

Paas

SaaS

40
New cards

40. Which of the following is not true regarding cloud computing?

-The term cloud is used as a metaphor for the Internet

-Typical cloud computing providers deliver common business applications online that are accessed from another Web server or software like a web browser

-Cloud computing requires end users to have knowledge of the physical location and configuration of the system that delivers the services

-Cloud computing is software, data access, computation, and storage services

Cloud computing requires end users to have knowledge of the physical location and configuration of the system that delivers the services.

41
New cards

41. Which of the following ports does FTP use to establish sessions and manage traffic?

80, 443

20,21

135-139

25,110

20,21

42
New cards

42. You want to store your computer generated audit logs in case they are needed in the future for examination. Which method can you use to ensure that the logs you put in storage have not been altered when you go to use them in the future?

-Store the logs in an offsite facility

-Create a hash of each log

-Make two copies of each log and store each copy in a different location

-Encrypt the logs

Create a hash of each log

43
New cards

43. What does hashing of log files provide?

Preventing the system from running when the log files are full

Preventing log files from being altered or overwritten

Proof that the files have not been altered

Sequencing of files and log entries to re-create a timeline of events

Proof that the files have not been altered.

44
New cards

44. Which of the following government acts protects medical records and personal health information?

ACA

FACTA

HIPAA

FISMA

HIPAA

45
New cards

45. When you dispose of a computer or cell used hardware and it is crucial that none of the data on the hard disks can be recovered, which of the following actions can you take to ensure that no data is recoverable?

Reformat all the hard disks in the computer

Encrypt all the data on the hard disks

Delete all files from all the hard disks in the computer

Damage the hard disks so badly that all data remaining is gone

Damage the hard disc so badly that all data remaining is gone.

46
New cards

46. How many keys are used with asymmetric (public key) cryptography?

One

Two

Three

Four

Two

47
New cards

47. A receiver wants to verify the integrity of the message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver used to access the hashing value and verify the integrity of the transmission?

A receiver's public key

Sender's private key

Sender's public key

Receiver's private key

Sender's public key

48
New cards

48. Which aspect of a birth certificate makes it a reliable and useful mechanism for proving the identity of a person, system, or service on the Internet?

It is a trusted third - party

It is a digital mechanism, rather than a physical one.

It uses electronic signatures.

It provides ease-of-use

It is a trusted third party

49
New cards

49. Which standard is most widely used for certificates?

SSL v.3.0

HTTP 1.1

802.1x

X.509

X.509

50
New cards

50. If you perform regular backups, what must be done to ensure that you are protected against data loss?

Write protect all backup media

Restrict restoration privileges to system administrators

Store the backup media in an on-site fireproof vault

Regularly test restoration procedures

Regularly test restoration procedures