IS5403 Week 5 All Quizezz

1.Which of the following is usually bundled as a hidden component of a freeware?

Spyware

2.Which of the following are characteristics of spyware? (Choose all that apply.)

Secretly collects information about users

Negatively affects confidentiality

Negatively affects availably

Tracking cookies and browser history can be used by spyware

It is greyware

3.Flash cookies are a type of spyware. What are ways to clean Flash cookies? (Choose all that apply.)

Anti-malware programs

Use a browser add-on

Disable Adobe Flash

4.Viruses, botnets, social engineering, and drive-by-downloads and other methods used to attack a target are best described as which of the following?

Threat vectors

5.Which of the following is a form of delayed-execution virus?

Logic bomb

6.Which of the following are zombie armies formed by a number of innocent hosts set up to perform malicious operations?

Botnets

7.Many botnets were controlled through using what protocol?

IRC

8.Which of the following involves deploying a large number of compromised hosts to flood a target system?

DDoS

9.DoS attacks are for gaining unauthorized access or control of a system.

False

10.Which of the following MAINLY applies to email that appears to be sent from a legitimate business?

Phishing

11.An attacker has targeted Corp.com’s employees with voicemails that attempt to acquire sensitive information by masquerading as a trustworthy entity. Which type of attack is this?

Vishing

12.Which of the following is NOT a valid physical security measure?

System patching

13.Which of the following statement regarding proper patch management is true?

Applying the correct patch, following the correct procedure, at the correct time.

14.Secure Sockets Layer (SSL) is the predecessor of:

TLS

15.Which model uses a sequential design process?

Waterfall model

16.Which type of residential lock is most often used for keeping out intruders?

Keyed entry lock

17.A lock that extends a solid metal bar into the door frame for extra security is the _____.

deadbolt lock

18.Which of the following is a cumulative package of all patches?

Service pack

19.Which stage is a “quality assurance” test that verifies the code functions as intended?

Staging stage

20.Which of these is a list of approved email senders?

Whitelist

21.Which statement about a mantrap is true?

It monitors and controls two interlocking doors to a room.

22.Which type of operating system runs on a firewall, router, or switch?

Network OS

23.Which of the following is NOT a characteristic of an alarmed carrier PDS?

Requires periodic visual inspections

24.How can an SDIO card be made secure?

Using the security mechanisms on a standard Wi-Fi network.

25.Which of the following is NOT a motion detection method?

Moisture

26.Which of the following is NOT a reason why supply chain infections are considered especially dangerous?

Supply chains take advantage of the trusted “chain of trust” concept.

27.How does heuristic detection detect a virus?

A virtualized environment is created and the code is executed in it.

28.What allows for a single configuration to be set and then deployed to many or all users?

Group Policy

29.Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?

Barricade

30.Which of the following types of testing uses unexpected or invalid inputs?

Dynamic analysis

31.Which of the following can be used to secure a laptop or mobile device?

Cable lock

32.Which of the following is NOT an advantage to an automated patch update service?

Users can disable or circumvent updates just as they can if their computer is configured to use the vendor’s online update service.

33.Which of the following is NOT a typical OS security configuration?

Restricting patch management

34.Which of the following is NOT a memory vulnerability?

Variable overflow

35.Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates?

Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks.

36.Which tool manages the distribution and control of apps?

MAM

37.What does containerization do?

It separates personal data from corporate data.

38.Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use?

push notification services

39.Which technology is NOT a core feature of a mobile device?

physical keyboard

40.Which of these is considered the strongest type of passcode to use on a mobile device?

password

41.Which of the following technologies provides for pictures, video, or audio to be included in text messages?

MMS

42.Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security?

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

43.What prevents a mobile device from being used until the user enters the correct passcode?

screen lock

44.Which type of OS is typically found on an embedded system?

RTOS

45.What allows a device to be managed remotely?

mobile device management (MDM)

46.Which of these is NOT a risk of connecting a mobile device to a public network?

Public networks are faster than local networks and can spread malware more quickly to mobile devices.

47.What enforces the location in which an app can function by tracking the location of the mobile device?

geofencing

48.A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called?

Jailbreaking

49.Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan’s mobile device?

reset to factory settings

50.Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today?

Infrared

51.Which of these is NOT a security feature for locating a lost or stolen mobile device?

last known good configuration

52.Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop?

Type D

53.In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?

CYOD

54.What is the process of identifying the geographical location of a mobile device?

geolocation

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG














Leave a Reply

Your email address will not be published. Required fields are marked *