1.Which of the following is usually bundled as a hidden component of a freeware?
Spyware
2.Which of the following are characteristics of spyware? (Choose all that apply.)
Secretly collects information about users
Negatively affects confidentiality
Negatively affects availably
Tracking cookies and browser history can be used by spyware
It is greyware
3.Flash cookies are a type of spyware. What are ways to clean Flash cookies? (Choose all that apply.)
Anti-malware programs
Use a browser add-on
Disable Adobe Flash
4.Viruses, botnets, social engineering, and drive-by-downloads and other methods used to attack a target are best described as which of the following?
Threat vectors
5.Which of the following is a form of delayed-execution virus?
Logic bomb
6.Which of the following are zombie armies formed by a number of innocent hosts set up to perform malicious operations?
Botnets
7.Many botnets were controlled through using what protocol?
IRC
8.Which of the following involves deploying a large number of compromised hosts to flood a target system?
DDoS
9.DoS attacks are for gaining unauthorized access or control of a system.
False
10.Which of the following MAINLY applies to email that appears to be sent from a legitimate business?
Phishing
11.An attacker has targeted Corp.com’s employees with voicemails that attempt to acquire sensitive information by masquerading as a trustworthy entity. Which type of attack is this?
Vishing
12.Which of the following is NOT a valid physical security measure?
System patching
13.Which of the following statement regarding proper patch management is true?
Applying the correct patch, following the correct procedure, at the correct time.
14.Secure Sockets Layer (SSL) is the predecessor of:
TLS
15.Which model uses a sequential design process?
Waterfall model
16.Which type of residential lock is most often used for keeping out intruders?
Keyed entry lock
17.A lock that extends a solid metal bar into the door frame for extra security is the _____.
deadbolt lock
18.Which of the following is a cumulative package of all patches?
Service pack
19.Which stage is a “quality assurance” test that verifies the code functions as intended?
Staging stage
20.Which of these is a list of approved email senders?
Whitelist
21.Which statement about a mantrap is true?
It monitors and controls two interlocking doors to a room.
22.Which type of operating system runs on a firewall, router, or switch?
Network OS
23.Which of the following is NOT a characteristic of an alarmed carrier PDS?
Requires periodic visual inspections
24.How can an SDIO card be made secure?
Using the security mechanisms on a standard Wi-Fi network.
25.Which of the following is NOT a motion detection method?
Moisture
26.Which of the following is NOT a reason why supply chain infections are considered especially dangerous?
Supply chains take advantage of the trusted “chain of trust” concept.
27.How does heuristic detection detect a virus?
A virtualized environment is created and the code is executed in it.
28.What allows for a single configuration to be set and then deployed to many or all users?
Group Policy
29.Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?
Barricade
30.Which of the following types of testing uses unexpected or invalid inputs?
Dynamic analysis
31.Which of the following can be used to secure a laptop or mobile device?
Cable lock
32.Which of the following is NOT an advantage to an automated patch update service?
Users can disable or circumvent updates just as they can if their computer is configured to use the vendor’s online update service.
33.Which of the following is NOT a typical OS security configuration?
Restricting patch management
34.Which of the following is NOT a memory vulnerability?
Variable overflow
35.Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates?
Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks.
36.Which tool manages the distribution and control of apps?
MAM
37.What does containerization do?
It separates personal data from corporate data.
38.Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use?
push notification services
39.Which technology is NOT a core feature of a mobile device?
physical keyboard
40.Which of these is considered the strongest type of passcode to use on a mobile device?
password
41.Which of the following technologies provides for pictures, video, or audio to be included in text messages?
MMS
42.Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security?
Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.
43.What prevents a mobile device from being used until the user enters the correct passcode?
screen lock
44.Which type of OS is typically found on an embedded system?
RTOS
45.What allows a device to be managed remotely?
mobile device management (MDM)
46.Which of these is NOT a risk of connecting a mobile device to a public network?
Public networks are faster than local networks and can spread malware more quickly to mobile devices.
47.What enforces the location in which an app can function by tracking the location of the mobile device?
geofencing
48.A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called?
Jailbreaking
49.Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan’s mobile device?
reset to factory settings
50.Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today?
Infrared
51.Which of these is NOT a security feature for locating a lost or stolen mobile device?
last known good configuration
52.Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop?
Type D
53.In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?
CYOD
54.What is the process of identifying the geographical location of a mobile device?
geolocation
Other Links:
See other websites for quiz:
Check on QUIZLET