Malware
Social Engineering
Security Terms
Operational Procedures
Network Security
100

Together, what are viruses, Trojans, and worms called?

Malware

100

Evelyn knocked out someone, took her clothing, and is now Ann, an IT manager. Which type of social engineering is this?

Impersonation

100

What is the definition of PHI?

Personal Health Information

100

You are part of an investigation for a users computer that was sent in for repairs. Which of the following Documentation should you consult FIRST?

The chain of custody agreement

100

Which port should be blocked if you dont want to allow remote unsecure logins to a server?

port 23


200

What is a software program that looks like one thing  but is actually doing something else that is malicious?

Trojan horse

200

An employee, Tim, reported that a suspicious and likely unhygienic individual was looking through the recycle bin.

Which of the following types of social engineering threats is this?

Dumpster diving

200

A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be:

PII - Personal Identifiable Informatiom

200

Which of the following must be true before you can enable and use a domain?

All computers must be on the same network


200

This hacking method utilizes controlled computers to carry out attacks

Botnets


300

What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?

Worms

300

Which of the following threats uses personalized information in an attempt at obtaining information?

Spear phishing

300

This is a feature that puts devices in a zone that has more lenient network policies.

a DMZ

300

An IT manager needs to re-image 30 computers.The image has  been created and is ready to be deployed via the network. Which of the following should be completed FIRST?

Boot from PXE

300

This form of authentication utilizes a PIN on top of a password

MFA

400

This type of malware encrypts data and holds it for ransom.

ransomware


400

This attack aims to get information from CEOs, for example

Whaling

400

This is a list that controls access.

ACL (Access Control List).

400

A computer on a Windows domain has been identified as not having the most current policy. Which of the following tools would a technician run on the local machine to rectify this?

gpupdate

400

This type of screen lock utilizes biometrics.

Fingerprint lock


500

This type of malware works to grant itself access to settings and filesystems.

Rootkit

500

This term refers to people following people behind doors.

Tailgating

500

This is a system that prevents network intrustions.

IPS(Intrusion Prevention System).

500

This policy outlines what a user can or cant do with a device on the network.

AUP(Acceptable Use Policy)

500

This form of encryption uses AES.

WPA2