Test-Out Module 4
4.1
What does "Availability" in the CIA Triad ensure?
Information is readily available to authorized users
What does "Integrity" in the CIA Triad guarantee?
Information is stored and transferred as intended
Why are computers considered high-value targets?
They are expensive and store valuable data
What should companies do to ensure the physical security of servers?
Keep servers in a locked room
What is the purpose of two-factor authentication (2FA)?
To add an extra step to logging in for increased security
What is authentication?
The process of ensuring that each account is only operated by its proper user
Which rule states that a user should only get the access they need to do their job and
nothing more?
Least Privilege
What is authorization?
The process of determining what rights and privileges a particular entity has
If you want suggestions about local restaurants, what needs to be enabled in your browser?
Location Tracking
What is accounting in the context of computer systems?
The process of documenting user actions on the computer system.
4.2
What is social engineering?
A method of deceiving others to share personal or sensitive information.
Why should you be careful with friend requests on social media?
Because they could be fake profiles created by hackers
What is the purpose of a security vestibule in preventing tailgating?
To allow only one person to enter at a time with proper credentials
What is spear phishing?
A type of phishing that targets specific individuals
You receive a text message claiming to be from your phone service provider, warning you about
unauthorized activity on your account. The message asks you to click on a link to verify your
account details.
What should you do?
Call the phone service provider using the number on their official website
What is smishing?
A type of phishing done through SMS/text messages
What is ransomware?
Malware that locks up a computer and demands money
What is a virus in the context of computer malware?
A type of malware that needs user action to spread
What is spyware?
Software that records information about a PC and its users
Jamie noticed that his computer and several others in his school's computer lab started
running very slowly and displaying strange messages at the same time.
What type of malware is most likely responsible for this?
Worm
4.3
What is "defense in depth"?
A layered security approach
What can happen if security tools are used incorrectly?
They can create more weaknesses
What criteria does a simple firewall use besides source and destination?
Protocol
Where are hardware firewalls typically installed?
At the edge of the network
What is the primary function of a firewall?
To filter network traffic
What is heuristic identification in antivirus software?
Looking for actions or behaviors similar to what viruses do
What is the primary function of antivirus software?
To identify and stop harmful attacks on your computer or network
What is patch management?
A process to ensure computers run reliably and securely
Why is it important to keep the operating system and application software current on patches?
To improve security and functionality
What is a zero-day attack?
An attack that exploits an unknown vulnerability