Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
7Activity
0 of .
Results for:
No results containing your search query
P. 1
It Chapter 9

It Chapter 9

Ratings:

3.0

(1)
|Views: 3,267 |Likes:
Published by HornyRabbit

More info:

Published by: HornyRabbit on May 12, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/29/2012

pdf

text

original

 
I.T. CHAPTER 9
A fingerprint reader is an example of which security technology?authorization
biometric
keyloggingsecurewaresmartcardWhich wireless security technology is a good choice when using Cisco equipment inconjunction with operating systems such as Windows and Linux?
LEAP
WEPWPAWTLSWhich type of program causes banners and ads to appear on the desktop without anyuser intervention?
adware
spywarestealth virustrojan horseWhat are two examples of malware? (Choose two.)registry cleaner pop-up blocker 
spyware
 
e-mail
Grayware
Which two characteristics describe a worm? (Choose two.)Executes when software is run on a computer.
Is self-replicating
.Hides in a dormant state until needed by an attacker.Infects computers by attaching to software code.
Travels to new computers without any intervention or knowledge of the user 
.An employee for a small company inadvertently allows a visitor to see their usernameand password. At home, the visitor then uses this information to gain access to thecompany network. This is an example of what type of threat?man-in-the-middlephishingphysical
social engineering
spoofingWhich is the best procedure to secure a laptop left at the office while the user is awayfor an extended period of time?Secure by a security cable wrapped around the leg of the user's desk.Put the laptop in a desk drawer in the locked office of the user.
 
Place the laptop in a locked security cage designed to store computer equipment
.Place the laptop in the office of the supervisor.Where is the safest place to store backups?portable lock boxlocked telecommunications room
locked server room
offsite secure facilityWhat is the best method for a company to secure data being transmitted across theInternet between remote sites?Use plain text in an e-mail.Use a shared server with an encrypted password on the file.
Use computers secured with smartcard authentication
.Use a VPN connection.Which threat to security uses traffic from zombie computers to overwhelm servers?DoS
DDoS
phishingspoofingSYN flood

Activity (7)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Emerson Suzumura liked this
Emerson Suzumura liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->