Chapter 29: Securing Computers

question

Mary’s company routinely labels data according to its sensitivity or potential danger to the company if someone outside accesses the data. This is an example of _____.
answer

data classification
question

Once you’ve gathered data about a particular system or you’ve dealt with a computer or network problem, you need to complete the mission by telling your supervisor. This is called _______.
answer

incidence reporting
question

_____ is the act of trying to get people to give their usernames, passwords, or other security information by pretending to be someone else electronically.
answer

phishing
question

Enable ______ to create Event Viewer entries when a specific file is accessed.
answer

object access auditing
question

Although not all _______ is malicious, it can lead to data destruction.
answer

unauthorized access
question

Most attacks on computer data are accomplished through ________.
answer

social engineering
question

Going through someone’s trash to uncover personal information is known as _____.
answer

dumpster diving
question

Many companies authenticate access to secure rooms using an ownership factor such as a(n) ______.
answer

smart card
question

A ______ is an authentication device that uses your physical body in some way, such as a retinal or fingerprint scanner.
answer

biometric device
question

Following someone into a restricted area is known as _______.
answer

tailgating
question

What is the process of using or manipulating people to gain access to network resources?
answer

Social engineering
question

Which of the following might offer good hardware authentication?
answer

Smart card
question

Which of the following tools would enable you to stop a user from logging on to a local machine but still enable him to log on to the domain?
answer

Local Security Policy
question

John dressed up in a fake security guard uniform that matched the uniforms of a company and then walked in with some legitimate employees in an attempt to gain access to company resources. What kind of attack is this?
answer

Tailgating
question

The first day on the job, Jill received a spreadsheet that listed approved software for users and clear instructions not to allow any unapproved software. What kind of policy must she follow?
answer

Compliance
question

Which of the following would be considered an environmental threat? (Choose three.)
answer

Temperature / Humidity / Power
question

A user account is a member of several groups, and the groups have conflicting rights and permissions to several network resources. The culminating permissions that ultimately affect the user’s access are referred to as what?
answer

Effective permissions
question

What type of authentication uses at least two different methods to determine the user’s identity?
answer

Multi factor authentication
question

What system enables users to categorize documents by importance and privacy?
answer

Data classification
question

Which threats are categorized as social engineering? (Select all that apply.)
answer

Telephone scams Dumpster diving
question

What do you call the documented list of everyone who has had access to a computer?
answer

User access list
question

A user calls and complains that the technician who fixed his computer removed some software he used to listen to music on the Internet. A check of approved software does not include the LimeWire application, so what should the supervisor do?
answer

Applaud the technician for proper compliance.
question

Your boss is considering getting an Internet connection for the office so employees have access to e-mail, but she is concerned about hackers getting into the company server. What can you tell your boss about safeguards you will implement to keep the server safe?
answer

Students should discuss the use of a firewall to protect against attacks from the Internet. They should also discuss antivirus software and the importance of keeping virus definitions up to date. Some students may discuss the use of Group Policy to limit Internet usage and prevent installation of spyware.

Get instant access to
all materials

Become a Member