You are on page 1of 9

For information security, what is the "I" in CIA?

Select one:
a. Integrity Correct
b. Information
c. Insurrection
d. Indigestion
Feedback
The correct answer is: Integrity
Question 2
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is an example of a personal software firewall?
Select one:
a. Microsoft ISA Server
b. Antivirus software
c. ZoneAlarm Correct
d. Proxy server
Feedback
The correct answer is: ZoneAlarm
Question 3
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What are some of the drawbacks to using HIDS instead of NIDS on a server? Select
the two best answers.
Select one or more:
a. HIDS cannot detect network attacks Correct

b. a HIDS has a low level of detection of operating systems attacks


c. HIDS may use lots of resources that can slow server performance Correct
d. HIDS cannot detect operating system attacks
Feedback
The correct answer is: HIDS may use lots of resources that can slow server
performance, HIDS cannot detect network attacks
Question 4
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is the best option to use to prevent spyware?
Select one:
a. Personal software firewall
b. Windows Defender Correct
c. Antivirus software
d. Whitelists
Feedback
The correct answer is: Windows Defender
Question 5
Correct
Mark 1.00 out of 1.00
FlaggedRemove flag
Question text
Which of the following is an inline device that checks all packets?
Select one:
a. Statistical anomaly
b. Personal software firewall
c. HIDS
d. NIDS Correct

Feedback
The correct answer is: NIDS
Question 6
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which type of hacker has no affiliation with an organization yet will hack systems
without malicious intent?
Select one:
a. Gray hat
b. Black hat
c. White hat Incorrect
d. Blue hat
Feedback
The correct answer is: Gray hat
Question 7
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following does the "A" in CIA stand for when it comes to IT security?
Select the best answer.
Select one:
a. Availability Correct
b. Auditing
c. Accountability
d. Assessment
Feedback
The correct answer is: Availability

Question 8
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
To protect against malicious attacks, what should you think like?
Select one:
a. Auditor
b. Hacker Correct
c. Network Admin
d. Spoofer
Feedback
The correct answer is: Hacker
Question 9
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
You are developing a security plan for your organization. Which of the following is
an example of a physical control?
Select one:
a. Encryption
b. DRP
c. ID Card Correct
d. Password
Feedback
The correct answer is: ID Card
Question 10
Correct
Mark 1.00 out of 1.00

Not flaggedFlag question


Question text
Which of the following can help to secure the BIOS of a computer? (Select the two
best answers.)
Select one or more:
a. User password
b. Disable USB ports
c. Case lock Correct
d. BIOS supervisor password Correct
Feedback
The correct answer is: Case lock, BIOS supervisor password
Question 11
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is the greatest risk for removable storage?
Select one:
a. Availability of data
b. Integrity of data
c. Confidentiality of data Correct
d. Accountability of data
Feedback
The correct answer is: Confidentiality of data
Question 12
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is an example of whole disk encryption?

Select one:
a. AES
b. Bluesnarfing
c. BitLocker Correct
d. Windows Vista Ultimate
Feedback
The correct answer is: BitLocker
Question 13
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following can help to prevent spam? (Select the two best answers.)
Select one or more:
a. Close open mail relays Correct
b. Run a Trojan scan
c. use a spam filter Correct
d. Consider technologies that discourage spyware
Feedback
The correct answer is: use a spam filter, Close open mail relays
Question 14
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following type of virus can change every time it is executed in an
attempt to avoid Antivirus detection?
Select one:
a. Boot sector
b. Polymorphic Correct

c. Macro
d. Armored
Feedback
The correct answer is: Polymorphic
Question 15
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Tom sends out many emails containing secure information to other companies.
What concept should be implemented to prove that Tom did indeed send the
emails?
Select one:
a. Confidentiality
b. Integrity
c. Nonrepudiation Correct
d. Authenticity
Feedback
The correct answer is: Nonrepudiation
Question 16
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following occurs when an IDS identifies legitimate activity as
something malicious?
Select one:
a. False-negative
b. Misidentification
c. False-positive Correct
d. Monitoring positive

Feedback
The correct answer is: False-positive
Question 17
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What are two ways of discouraging bluesnarfing? (Select the two best answers.)
Select one or more:
a. Turn off the device
b. Use infrared
c. Set the device to undiscoverable Correct
d. Use a difficult to guess pairing key Correct
Feedback
The correct answer is: Use a difficult to guess pairing key, Set the device to
undiscoverable
Question 18
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
In information security, what are the three main goals? (Select the three best
answers.)
Select one or more:
a. Auditing
b. Availability Correct
c. Risk Assessment
d. Confidentiality Correct
e. Nonrepudiation
f. Integrity Correct

Feedback
The correct answer is: Integrity, Confidentiality, Availability
Question 19
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following methods of malware delivery is used in computer programs
to bypass normal authentication?
Select one:
a. Backdoor Correct
b. Active interception
c. Rootkit
d. Privilege escalation
Feedback
The correct answer is: Backdoor

You might also like