Professional Documents
Culture Documents
TRUE/FALSE
1. Developing steps to recover from an unavoidable disaster is one step in the process of risk
management.
6. Biometrics is a method of authentication used to confirm a person’s identity based on some physical
trait.
7. A firewall is software or hardware designed to filter out suspicious packets attempting to enter or leave
a computer.
9. Worms attach themselves to a file, reproduce, and spread to other files on the same computer.
10. Viruses programmed to deliver their payloads on a certain date are called time bombs.
11. Encryption transforms a message so that its contents are hidden from unauthorized readers.
12. Spam filters are not included in email clients and security suites.
ANS: F PTS: 1 REF: 159
15. A boot disk contains a complete copy of your computer’s hard disk as it existed when shipped from the
manufacturer.
MODIFIED TRUE/FALSE
1. The power strip shown in the figure above is an appliance designed to protect electrical devices from
power surges and voltage spikes. _________________________
ANS: F, surge
3. LANjackers use network-detecting and monitoring software, like the software shown in the figure
above, to help locate and identify secured and unsecured networks. _________________________
ANS: F, Security
5. Publications like the one shown above help risk management professionals design and update disaster
recovery plans. _________________________
MULTIPLE CHOICE
1. MTBF is a rating that attempts to measure the time before a(n) ____ failure occurs.
a. hardware c. power
b. software d. operator
ANS: A PTS: 1 REF: 146
3. ____ is the term used to describe terrorist acts committed via the Internet.
a. Hacking c. Operator error
b. Cyberterrorism d. LANjacking
ANS: B PTS: 1 REF: 147
6. A ____ is a program that seems to perform one function, while actually doing something else.
a. malicious program c. macro
b. worm d. Trojan horse
ANS: D PTS: 1 REF: 153
7. A ____ is one term for someone who creates and unleashes malware.
a. cracker c. worm
b. Trojan horse d. bot
ANS: A PTS: 1 REF: 152
8. ____ involves writing specific symbols on walls, sidewalks, or lampposts to signal others they can tap
into a wireless network in the area.
a. War driving c. War chalking
b. LANjacking d. GPS
ANS: C PTS: 1 REF: 156
9. Which of the following is NOT one of the steps a worm makes when infecting a computer system?
a. Slows processing time.
b. Enters the host computer through e-mail.
c. Destroys storage space.
d. Copies itself and attempts to travel to other hosts.
ANS: C PTS: 1 REF: 152
10. A ____ virus infects the system files on your computer causing widespread damage to your hard drive.
a. blended threat c. RAT
b. boot sector d. Trojan horse
ANS: B PTS: 1 REF: 152
12. A ____ usually arrives as an email message containing warnings of a new virus.
a. botmaster c. keylogger
b. virus hoax d. zombie
ANS: B PTS: 1 REF: 154
15. A(n) virus ____ is a section of program code that can be used to identify a known malicious program.
a. fingerprint c. signature
b. ID d. procedure
ANS: C PTS: 1 REF: 155
16. A virus ____ is a file that your antivirus software uses to identify and remove malware.
a. signature c. checksum
b. definition d. patch
ANS: B PTS: 1 REF: 155
17. A ____ is the basis for scrambling and unscrambling the data transmission between wireless devices.
a. firewall c. wireless network key
b. cookie d. wireless node
ANS: C PTS: 1 REF: 157
18. A ____ is a message containing information about a user sent from a Web server to a browser and
stored on the user’s hard drive.
a. Trojan horse c. cookie
b. multi-partite d. stealth
ANS: C PTS: 1 REF: 158
19. A(n) ____ backup contains a copy of every program, data, and system file on a computer.
a. restoration c. differential
b. bootstrap d. full
ANS: D PTS: 1 REF: 160
20. The Windows ____ is a file that stores configuration information about the devices and software
installed on a computer system.
a. root directory c. Registry
b. backup d. Explorer
ANS: C PTS: 1 REF: 160
21. You do not have to click anything to receive a third-party cookie generated by a ____.
a. clear GIF c. Web bug
b. Flash cookie d. A or C
ANS: D PTS: 1 REF: 159
23. When storing your backup files on a LAN, consider each of the following EXCEPT ____:
a. The size of your backup files.
b. Password-protected folders to prevent unauthorized access.
c. That the server is backed up regularly.
d. You should consider all of the above.
ANS: D PTS: 1 REF: 160
24. Backup software is a set of ____ programs designed to back up and restore files.
a. security c. defrag
b. utility d. technique
ANS: B PTS: 1 REF: 161
25. A facility that is designed to house and protect a computer system and its data is called a(n) ____
center.
a. data c. recovery
b. information d. disaster
ANS: A PTS: 1 REF: 146
26. In the figure above, the worm enters the original host and other unprotected hosts using ____.
a. infected files c. e-mail
b. a backdoor d. a packet
ANS: C PTS: 1 REF: 152
27. When referring to war driving and war chalking, war stands for ____.
a. wireless area resources c. wired access resources
b. wireless access revolution d. wireless account resources
ANS: B PTS: 1 REF: 156
28. Item ____ in the figure above indicates an open (available) node.
a. 1
b. 2
c. 3
d. None of the symbols indicate an open node.
ANS: A PTS: 1 REF: 156
32. Which of the following statements it NOT true about the figure shown above?
a. It is a specially designed lock. c. It is used to prevent theft.
b. It can be attached to a cable. d. It cannot be fastened to a desk.
ANS: D PTS: 1 REF: 148
33. Which of the following statements it NOT true about the figure shown above?
a. It prevents unauthorized data access.
b. It is affixed to the underside of the computer or to a desk.
c. It is used to prevent theft.
d. It anchors your computer to your desk.
ANS: A PTS: 1 REF: 148
34. The device shown in the figure above provides the best protection against power problems. What is
the name for this device?
a. GPS c. GIS
b. UBS d. UPS
ANS: D PTS: 1 REF: 149
36. Which of the following is NOT typically included with a data center?
a. fireproof construction c. static floor coverings
b. power generators d. sprinkler systems
ANS: C PTS: 1 REF: 146
38. Which of the following is NOT an appliance designed to protect electrical devices from power surges
and voltage spikes?
a. surge suppressor c. surge strip
b. power strip d. surge protector
ANS: B PTS: 1 REF: 149
39. A(n) ____ verifies a user ID and guarantees that you are the person you claim to be.
a. password c. ID
b. protocol d. username
ANS: A PTS: 1 REF: 150
40. Data security on a system that is guarded by user IDs and passwords depends on password ____.
a. protocol c. characteristics
b. secrecy d. rights
ANS: B PTS: 1 REF: 150
41. Authentication protocols that use more than one means of identification are ____ secure than others.
a. less c. equally as
b. more d. not as
ANS: B PTS: 1 REF: 150
43. A ____ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to
other files on the same computer.
a. computer worm c. Trojan horse
b. mass-mailing worm d. computer virus
ANS: D PTS: 1 REF: 152
45. ____ is a type of program that secretly gathers personal information without the victim’s knowledge,
usually for advertising and other commercial purposes.
a. Botmaster c. Antivirus
b. Trojan horse d. Spyware
ANS: D PTS: 1 REF: 153
49. ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on
devices that have a valid key.
a. LANjacking c. War chalking
b. Wireless encryption d. War driving
ANS: B PTS: 1 REF: 156
COMPLETION
1. Human error, also called ____________________ error, includes entering inaccurate data or not
following procedures.
ANS:
operator
user
ANS: failure
3. ____________________ protocol refers to any method that confirms a person’s identity when using a
computer system.
ANS: Authentication
ANS: Two-factor
user ID
username
login
handle
screen name
online nickname
ANS:
biometric
biometrics
8. A(n) ____________________ attack helps hackers guess your password by stepping through a list of
thousands of the most common passwords.
ANS: dictionary
9. A password ____________________ is utility software that generates secure passwords and stores
them along with user IDs.
ANS: manager
10. ____________________ are rules that limit the directories and files that each user can access.
MATCHING
ESSAY
ANS:
Some symptoms include:
2. List three ways to prevent your computer from becoming infected by malware.
ANS:
Guidelines, such as the following, can help keep your computer safe:
3. Describe at least five tips for keeping your computer system in good working condition.
ANS:
• Regularly clean computer components and peripheral devices
• Avoid spills into your keyboard
• Always shut down your PC before cleaning your keyboard
• Be careful if using a vacuum cleaner to clean your keyboard
• Use slightly moistened cotton swabs with a mild cleaning fluid to clean sides of keys
• Wipe the tops of keys with a soft, slightly dampened cloth
• Allow keyboard to dry before reconnecting it to your PC
• Regularly use a can of compressed air or a vacuum cleaner hose to clean out debris such as dust
particles, dirt, etc. from the keyboard, vents, and fans
• Exercise extreme caution when cleaning out the computer’s system case
• Turn off your PC and peripheral devices before cleaning
• Do not touch the system board
• Be careful to not knock any cables loose
CASE
1. Your coworker, Casey, asks you to explain the differences in a password and a PIN. What would you
tell her?
ANS:
A PIN tends to be a short sequence of numbers that can be entered using a numeric keypad. PINs are
typically used with two-factor authentication protocols.
A password tends to be a longer sequence of letters, numbers, and special characters. Entering a
password usually requires a full qwerty keyboard. Passwords are used in conjunction with single-
factor authentication protocols.
You have just been hired as an assistant to the network administrator at a local company. You are asked
to give a presentation on viruses, worms, bots, Trojans, and spyware and include the unauthorized
activities the network might see if malware enters the company’s network.
ANS:
A network traffic jam generates traffic on the local area network and the Internet. It causes service to
deteriorate as download time increases for files, Web pages, and email messages.
ANS:
Denial-of-Service (DoS) attack
4. Users on the network are blocked from accessing certain Web sites, home page settings are being
changed, and browsers are being redirected to infected Web sites. What is the likely problem?
ANS:
Browser reconfiguration
5. A coworker contacts you to inspect the computer in her office. She suspects that it is infected with
malware. What steps will you take?
ANS:
1. Immediately use security software to scan the computer.
2. If a virus, worm, Trojan horse, or bot is found in a file or attachment, try to remove the infection.
3. Put the file into quarantine or delete the file.