Q.1
Which of the following are consider physical security risks?
  • Hardware theft
  • password cracking
  • phishing
  • cooking
Q.2
Which of the following may result in a malware infection?
  • Opening an email attachment
  • Downloading a file from a website
  • Clicking on an infected link
  • All of the above
Q.3
Which of the following is not effective in preventing malware infections?
  • Opening email attachments
  • Turning on Windows Automatic Updates
  • Installing anti-virus software
  • Setting Internet Explorer's security setting to medium-high
Q.4
What does a keylogger do?
  • provides
  • prevents certain data from being entered
  • encrypts data entered with a keyboard
  • tracks a user's keystrokes on the keyboard
Q.5
Which legislation covers data protection through wire and electronic transmissions of data?
  • CFAA
  • ECPA
  • HIPAA
  • SOX
Q.6
Which statements represent elements of the three aspects of the CIA security triad?
  • Permissions should be given to department managers to ensure data access.
  • All data should be password protected.
  • Data should only be changed by authorized users.
  • All of above
Q.7
Which is true regarding a secure cookie?
  • The cookie contents are encrypted.
  • The cookie can only be sent with https.
  • The cookie can be sent with http or https.
  • Both A & B
Q.8
Which refers as the practice of protecting information by mitigating information risks.
  • Vulnerability
  • Information Security
  • Vectors
  • Application
Q.9
If a file has been altered without permission or knowledge, this violates the principle of ____.
  • encryption
  • integrity
  • least privilege
  • confidentiality
Q.10
Which security technique is provided by using multiple levels of protection, such as firewalls, antimalware software, and strong password policies?
  • Integrity
  • Nonrepudiation
  • Defense in depth
  • Principle of least privilege
Q.11
Which security domain secures Supervisory Control and Data Acquisition (SCADA) systems, such as a citywide electrical grid?
  • System
  • WAN
  • LAN
  • Remote Access
Q.12
A computer that does not have any antimalware programs installed represents a ____ to data.
  • threat
  • vulnerability
  • payload
  • time bomb
Q.13
A computer has been infected with malware that allows the hacker to access the computer through a backdoor from a distant location. What is the most likely example of the malware on this machine?
  • Trojan horse
  • Logic bomb
  • Remote access Trojan
  • Armored virus
Q.14
___ is malware that prevents legitimate access to data by encrypting the data content.
  • Drive-by-download
  • Polymorphic
  • Worm
  • Ransomware
Q.15
There has been a fire in your office building, all computers have been damaged
  • Phone the technician
  • Use on site back up
  • Keep paper copies of customer information
  • Use off site back up
Q.16
The action or intent of a virus is called its ____.
  • threat
  • payload
  • design
  • strategy
Q.17
A user unknowingly visits a webpage that has been compromised with ransomware, which was downloaded to the user’s device. This is an example of a ____.
  • vulnerability
  • crypto-infection
  • drive-by-download
  • nonrepudiation process
Q.18
Microsoft documents can be easily compromised by ____.
  • time bombs
  • ransomware
  • rootkits
  • macro viruses
Q.19
A(n) ____ exists in software when it was released and remains unknown until it is exploited by hackers.
  • adware
  • bug
  • zero-day vulnerability
  • weak app
Q.20
A virus has infected your computer system, employee records cannot be opened
  • Back up information regularly (on site or off site)
  • Keep a bundle of paper employee details on your desk
  • Restrict physical access around the office
  • Re-enter all employee data into the system when this happens
0 h : 0 m : 1 s