COMPLETE SOLUTIONS GRADED A++ LATEST UPDATE
Encryption, authentication, and anti-malware are all ways to protect against malicious threats.
True
An example of authorization with "something you are" would be?
Retina Pattern
By an overwhelming percentage, most security / data breaches are caused by:
Human Error/Negligence
All are types of physical security except:
Concrete Barriers
Which of the following does the "A" in "CIA" stand for when relating to IT security?
Availability
Social engineering includes viruses, worms, and Trojan horses.
False
Which type of hacker has no affiliation with an organization yet will hack systems without malicious
intent, but yet may be doing something illegal?
Gray Hat
,When a network security device experiences a system failure, it is best for it to default to a "Fail /
Open" state.
False
For information security, what is the I in CIA?
Integrity
Tom sends out many e-mails containing secure information to other companies. What concept should
be implemented to prove that Tom did indeed send the e-mails?
Nonrepudiation
Which of the following is the greatest risk for removable storage?
Confidentiality of Data
In information security the three main goals are known as Confidentiality, Integrity, and Availability.
True
Which is not a type of Social Engineering?
Trojan
Which of the following is an example of a personal software firewall?
ZoneAlarm
Which of the following methods of malware delivery is used in computer programs to bypass normal
authentication?
Backdoor
, One of the biggest problems with BYOD is
There is virtually no security control over the sofware / hardware.
Which of the following occurs when an IDS identifies legitimate activity as something malicious?
False-Positive
Opening mail relays can decrease the amount of spam that an organization receives on its e-mail
server.
False
Which of the following is an example of whole disk encryption?
Bitlocker
A master computer controls a botnet.
True
Most antimalware / virus software is signature based.
True
A RAT is an example of a Trojan horse.
True
Malware is software designed to infiltrate a computer system without the users consent.
True
Active interception is the act of exploiting a bug or design flaw in software.
False