ANSWERS ALL CORRECT
A chief information officer (CIO) works for a mid-sized company located on the
California coast. The CIO is developing a disaster plan for the IT infrastructure in the
event of an earthquake powerful enough to damage or destroy network and computing
equipment, including the database servers. What can she do to protect valuable
company data even under the worst circumstances? - Answer- Have the data regularly
backed up and stored in a secure, off-site facility not prone to such environmental
dangers.
A company's IT security engineer has noticed several employees periodically checking
their social media accounts. One such platform allows chat, which can include sharing
links, photos, and videos. When the engineer casually observes one user about to click
a link to view a video, she stops the worker. Afterward, she approaches the chief
information officer (CIO) and advises that all social media accounts be blocked, and that
only online training videos authorized by the company be allowed to be viewed. What
threat is the IT security engineer concerned about? - Answer- Trojan horse
A chief financial officer's (CFO's) business account has been leaked onto the Internet,
including the CFO's username, password, and financial data. The firm's security
manager scanned the CFO's computer for viruses, which was clean. However, the
manager is still convinced that the CFO's computer is somehow compromised, allowing
whatever is typed to be disclosed. The manager recalls that six weeks ago, the CFO's
assistant was caught illicitly accessing secure financial files and was subsequently
dismissed. What is the likely problem? - Answer- Hardware keystroke logger
In theory, a hacker with a small but powerful directional antenna could access a
wireless network from more than one mile away. In a real-world situation, what is the
more likely range involved? - Answer- Less than 1,000 feet
A mid-sized company's IT security engineer is attempting to make it more difficult for the
company's wireless network to be compromised. She is using techniques such as
random challenge-response dialogue for authentication, timestamps on authentication
exchanges, and one-time pad or session-based encryption. What form of wireless
attack is she defending against? - Answer- Replay
Several times this week, the IT infrastructure chief of a small company has suspected
that wireless communications sessions have been intercepted. After investigating, he
believes some form of insertion attack is happening. He is considering encrypted