• 1. 
    Which of the following would be considered an IoT device?

  • Tablet
  • Desktop PC
  • Video doorbell
  • Cell phone
  • 2. 
    Which security technique is provided by using multiple levels of protection, such as firewalls, antimalware software, and strong password policies?

  • Integrity
  • Nonrepudiation
  • Defense in depth
  • Principle of least privilege
  • 3. 
    Which of the following describes a type of malware that can only infect a computer after specific criteria have been met?

  • Time bomb
  • Logic bomb
  • Worm
  • Backdoor
  • 4. 
    Which type of shredder is the best defense against dumpster diving?

  • strip-cut shredder
  • cross-cut shredder
  • micro-cut shredder
  • mini-cut shredder
  • 5. 
    Specific conditions or configurations must exist before this malware is executed

  • Time Bomb
  • Logic Bomb
  • Worm
  • Rootkit
  • 6. 
    Microsoft documents can be easily compromised by ____.

  • time bombs
  • ransomware
  • rootkits
  • macro viruses
  • 7. 
    A(n) ____ exists in software when it was released and remains unknown until it is exploited by hackers.

  • adware
  • bug
  • zero-day vulnerability
  • weak app
  • 8. 
    ___ is malware that prevents legitimate access to data by encrypting the data content.

  • Drive-by-download
  • Polymorphic
  • Worm
  • Ransomware
  • 9. 
    A computer that does not have any antimalware programs installed represents a ____ to data.

  • threat
  • vulnerability
  • payload
  • time bomb
  • 10. 
    PCI DSS applies to which type of businesses?

  • Any business that accepts credit card transactions
  • Organizations that are publicly traded
  • Organizations that submit data through the Internet
  • Organizations that deal with financial information
  • 11. 
    Security domain that addresses firewall settings and rules

  • WAN
  • LAN
  • Workstation
  • System
  • 12. 
    Which of the following security domains represents the weakest link in the security chain?

  • Workstation
  • User
  • System
  • LAN
  • 13. 
    Which of the following helps provide confidentiality to data?

  • A secure password
  • Encryption
  • Nonrepudiation
  • Antimalware
  • 14. 
    Which of the following will provide the best search results for information on rootkits on Symantec’s website?

  • Allintitle:Symantec +rootkit
  • Site:Symantec.com “rootkit”
  • cache:rootkit +Symantec
  • Filetype:pdf “Symantec rootkit”
  • 15. 
    Which is a true statement regarding adware?

  • Adware is always malware.
  • Adware is never malware.
  • Adware often results in pop-up advertisements.
  • Adware runs on a computer without the user’s consent.
  • 16. 
    Which of the following search queries will allow you to search the Internet for hardware-specific keyloggers with the best result?

  • keylogger -hardware
  • Site:hardware keylogger
  • keylogger +hardware
  • keylogger -software +hardware
  • 17. 
    Which security principle is violated by an attack in which users are unable to access their files?

  • Availability
  • Principle of least privilege
  • Integrity
  • Nonrepudiation
  • 18. 
    A ____ cookie remains on your computer until the expiration date is reached.

  • session
  • persistent
  • third-party
  • super
  • 19. 
    Type of malware that inserts snippets of code inside Microsoft Office type files.

  • Logic Bomb
  • Worm
  • Rootkit
  • Macro virus
  • Polymorphic virus
  • 20. 
    Which element of the CIA triad deals with ensuring users only access files they need to do their job?

  • Authorization
  • Integrity
  • Availability
  • Confidentiality
  • 21. 
    Which type of malware is designed to prevent anyone from reading the source code?

  • Rootkit
  • RAT
  • Armored virus
  • Ransomware
  • 22. 
    Which of the following is a true statement?

  • Updated antimalware programs always find the latest threats on a system.
  • Opening e-mail attachments is a common attack vector for malware.
  • USB drives are no longer vulnerable to malware infection.
  • Heuristic analysis of systems can find only previously known viruses or threats.
  • 23. 
    Which is the primary reason to use cookies?

  • To remember settings for users when returning to the site
  • To place malware on computers
  • To track every website a user opens
  • To provide clues to a user’s actions on their computer
  • 24. 
    A virus that continuously changes its characteristics to avoid detection is called a(n) ____ virus.

  • armored
  • stealth
  • polymorphic
  • Trojan horse
  • 25. 
    Malware type that is potentially very destructive, provides unlimited access to a computer from a remote location, and is very difficult to remove

  • Macro virus
  • Worm
  • Rootkit
  • Logic Bomb
  • Polymorphic virus
  • 26. 
    A ____ occurs when an antimalware program identifies a file as malware, but the file is a valid, nonmalicious file.

  • false positive
  • false negative
  • true positive
  • true negative
Report Question
warning
access_time
  Time