Together, what are viruses, Trojans, and worms called?
Malware
Evelyn knocked out someone, took her clothing, and is now Ann, an IT manager. Which type of social engineering is this?
Impersonation
What is the definition of PHI?
Personal Health Information
You are part of an investigation for a users computer that was sent in for repairs. Which of the following Documentation should you consult FIRST?
The chain of custody agreement
Which port should be blocked if you dont want to allow remote unsecure logins to a server?
port 23
What is a software program that looks like one thing but is actually doing something else that is malicious?
Trojan horse
An employee, Tim, reported that a suspicious and likely unhygienic individual was looking through the recycle bin.
Which of the following types of social engineering threats is this?
Dumpster diving
A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be:
PII - Personal Identifiable Informatiom
Which of the following must be true before you can enable and use a domain?
All computers must be on the same network
This hacking method utilizes controlled computers to carry out attacks
Botnets
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?
Worms
Which of the following threats uses personalized information in an attempt at obtaining information?
Spear phishing
This is a feature that puts devices in a zone that has more lenient network policies.
a DMZ
An IT manager needs to re-image 30 computers.The image has been created and is ready to be deployed via the network. Which of the following should be completed FIRST?
Boot from PXE
This form of authentication utilizes a PIN on top of a password
MFA
This type of malware encrypts data and holds it for ransom.
ransomware
This attack aims to get information from CEOs, for example
Whaling
This is a list that controls access.
ACL (Access Control List).
A computer on a Windows domain has been identified as not having the most current policy. Which of the following tools would a technician run on the local machine to rectify this?
gpupdate
This type of screen lock utilizes biometrics.
Fingerprint lock
This type of malware works to grant itself access to settings and filesystems.
Rootkit
This term refers to people following people behind doors.
Tailgating
This is a system that prevents network intrustions.
IPS(Intrusion Prevention System).
This policy outlines what a user can or cant do with a device on the network.
AUP(Acceptable Use Policy)
This form of encryption uses AES.
WPA2