• 1. 
    A cookie that remains until an expiration date is met is:

  • session cookie
  • secure cookie
  • persistent cookie
  • super cookie
  • 2. 
    All of the following are business security domains except:

  • hackers
  • users
  • WAN
  • system
  • 3. 
    How does a zero-day vulnerability differ from malware?

  • they are the same type of threat
  • it is a flaw in software when it was released, not an infection
  • it can be passed from one computer to another, where malware cannot
  • it is not a security concern, where malware is a concern
  • 4. 
    Which security principles are covered by the CIA triad?

  • certified, integrated, accessible
  • continuity, integrity, accessibility
  • confidentiality, integrity, availability
  • confidentiality, installation, assembly
  • 5. 
    A sales rep has edited the electronic rota to give herself an extra 3 weeks off in the summer

  • Restrict access on the computer systems
  • Restrict physical access around the office
  • Tell staff to stay away from the HR file on the system
  • Make use of a firewall
  • 6. 
    How does a rootkit virus work?

  • provides a secret or unknown access point into a system
  • deploys its payload when a date or time occurs
  • infects a computer before the operating system loads
  • hides inside other software that appears to be harmless
  • 7. 
    A virus has infected your computer system, employee records cannot be opened

  • Back up information regularly (on site or off site)
  • Keep a bundle of paper employee details on your desk
  • Restrict physical access around the office
  • Re-enter all employee data into the system when this happens
  • 8. 
    What does compliance mean?

  • providing secure access to user data
  • using honest means to bypass security measures
  • conducting tests to identify vulnerabilities in a system
  • following the rules or standards that have been established
  • 9. 
    Your on site back up drives have been stolen from the file room

  • Restrict access on computer systems
  • Restrict physical access around the office
  • Hide the back ups in different drawers every week
  • Ask employees to stay out of the file room
  • 10. 
    Which law prevents company executives from hiding or destroying electronic records?

  • SOX
  • ECPA
  • GLBA
  • CFAA
  • 11. 
    A virus has been downloaded by an employee

  • Restrict physical access around the office
  • Use a firewall
  • Install an anti-virus
  • Ask employees to stay away from risky websites
  • 12. 
    A new member of staff has deleted some of the template invoices on the system

  • Make all master copies 'read only'
  • Give new members of staff a long list of files that they shouldn't access
  • Use encryption
  • Install an anti-virus
  • 13. 
    What does a keylogger do?

  • provides
  • prevents certain data from being entered
  • encrypts data entered with a keyboard
  • tracks a user's keystrokes on the keyboard
  • 14. 
    Which of the following is not considered social engineering?

  • dumpster diving
  • convincing people to reveal information
  • encrypting data to prevent user access until a fee is paid
  • looking through social media sites for information
  • 15. 
    There has been a fire in your office building, all computers have been damaged

  • Phone the technician
  • Use on site back up
  • Keep paper copies of customer information
  • Use off site back up
  • 16. 
    Which malware does not steal or destroy data, rather prevents user access to it until a fee is paid?

  • armored virus
  • time or logic bomb
  • ransomware
  • Trojan horse
  • 17. 
    One of your business laptops containing private customer information has been left on a train

  • Use a firewall
  • Tell employees to use pen drives instead of taking laptops home
  • Encrypt business laptops
  • Install an anti-virus
  • 18. 
    A hacker has stolen all of your customer information

  • Install an anti-virus
  • Keep all customer data on paper
  • Use a firewall
  • Restrict physical access around the office
Report Question