Physical Security Methods
Security Threats
Software Security Methods
Storage
Parts of the Computer
100
What is the best way to keep your business safe from strangers following authorized personnel into secure places? A. File Encryption B. Employee badges C. Biometric Safes D. Mantraps
D. Mantraps
100
Which of the following forms of attack gains knowledge of a person's confidential information by looking at their keystrokes while they use the computer? A. Ice Phishing B. Brute Forcing C. Keywatch Engineering D. Shoulder Surfing
D. Shoulder Surfing
100
You are configuring the local security policy of a Windows XP system. You want to require users to create password that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which policies should you configure? (Select two.) A. Minimum password length B. Maximum password age C. Account lockout threshold D. Enforce password history
"A. Minimum password length" and "C. Account lockout threshold"
100
What is the maximum storage space of a standard single-sided DVD (DVD-5)? A. 3.8 GB B. 8.5 GB C. 7.4 GB D. 4.7 GB
D. 4.7 GB
100
What does the acronym "RAM" stand for? A. Random Archaic Module B. Readable Archaic Memory C. Readable Access Module D. Random Access Memory
D. Random Access Memory
200
Biometrics is: A. Using the weather outside to maintain security in file and folder structure B. The identification of humans by their characteristics or traits C. Using a randomly generated password with an encrypted hard drive D. The use of knowledge of a person to steal their password
B. The identification of humans by their characteristics or traits
200
Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through e-mails or Web sites that impersonate an online entity that the victim trusts, such as a financial institution or well known e-commerce site? A. Fraggle attack B. Social engineering C. Phishing D. Session hijacking
C. Phishing
200
In which of the following situations should you install a firewall? A. You want to implement a password system for Internet users who access your private website. B. You want to improve Internet performance by saving popular web sites locally. C. You want to restrict Internet users from accessing private data on your network. D. You want Internet users to see a single IP address when accessing your company network.
C. You want to restrict Internet users from accessing private data on your network.
200
How much Storage Space does a 12cm Blu Ray disk have? A. 70GB B. 50GB C. 90GB D. 140 GB
B. 50GB
200
Where is SO-DIMM Memory usually found in? A. Servers B. Laptops C. Desktops D. Ireland
B. Laptops
300
What is the best way to keep information on a lost mobile device safe? A. Encryption B. Fly Phishing C. Remote Wipe D. Lock Password
C. Remote Wipe
300
Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through asking the person directly under false pretenses? A. Random Access Violation B. Phishing C. Social engineering D. Real-Ask Semi Knowledge
C. Social engineering
300
Which of the following password policy will force users to change the password after the specified time interval ? A. maximum password age B. enforce password history C. password complexity D. minimum password age
A. maximum password age
300
What do solid state drives use to store data? A. Flash memory B. Platter memory C. Floppy memory D. SO-DIMM
A. Flash memory
300
During a power loss, what occurs to the stored data in RAM? A. It is stored on the Hard Drive B. It stays on the RAM module C. It is erased from memory D. It enjoys a long needed vacation
C. It is erased from memory
400
What is the best countermeasure against social engineering? A. User awareness training B. Access auditing C. Strong passwords D. Acceptable use policy
A. User awareness training
400
Which type of malicious activity can be described as numerous unwanted and unsolicited e-mail messages sent to a wide range of victims? A. Spamming B. Hijacking C. Brute force D. Trojan horse
A. Spamming
400
Which of the following actions taken on Windows XP directly improves system security? (Select two.) A. Install anti-virus software. B. Configure 802.11g networking. C. Use Task Schedule to take regular backups. D. Enable the Windows firewall.
"A. Install anti-virus software" and "D. Enable the Windows firewall"
400
What type of File System does Windows Vista require itself to be installed on in order to function? A. NTFS B. FAT34 C. exFAT D. CDFS
A. NTFS
400
This level of cache is usually found on the the CPU on modern systems. A. L1 cache B. M3 cache C. A1 cache D. A3 cache
A. L1 cache
500
What is the best countermeasure against social engineering? A. User awareness training B. Access auditing C. Strong passwords D. Acceptable use policy
A. User awareness training
500
Which form of security hacking is performed when a hacker guesses a password over and over again until he eventually gets the correct one? A. Social engineering B. Brute Forcing C. Phishing D. UR-1-SOL-SOB attack
B. Brute Forcing
500
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? A. WEP B. WEP, WPA Personal, and WPA2 Personal C. WPA Enterprise and WPA2 Enterprise D. WPA Personal and WPA2 Personal
B. WEP, WPA Personal, and WPA2 Personal
500
What type of File System is most commonly used on Compact Discs? A. exFAT B. CDFS C. NTFS D. FAT32
B. CDFS
500
The L3 cache is located between the: A. Hard Drive and CD Drive B. CPU and Hard Drive C. CPU and RAM D. CPU and L1 Cache
C. CPU and RAM