You are on page 1of 1

A+ Security 1. Which type of security threat is a self-replicating program that is harmful to networks? 2.

Which tools can be used by attackers to install a program on a computer browsing the internet? 3. An attacker pretends to represent a legitimate outside organization. 4. Displays unwanted advertising on your computer 5. Monitors user and reports activities back to organization that sent it. 6. Is a form of attack that prevents users from accessing normal services, such as email and a web server, because the system is busy responding to abnormally large amounts of requests? 7. Form of attack that uses many infected computers, called zombies, to launch an attack. 8. Also known as junk mail, is unsolicited e-mail that may include links to an infected website or an attachment that could infect a computer. 9. What is a security policy? (5) 10. Which command is used to convert the FAT32 file system to a more secure NTFS system? 11. Which of the following is good password practice? a. Passwords should expire after a specific period of time. b. Passwords should contain a mixture of letters and numbers so that they cannot easily be broken. c. Password standards should prevent users from writing down passwords and leaving them unprotected from public view. d. Rules about password expiration and lockout should be defined. e. All of the above 12. Differentiate between an OS patch and a service pack? 13. Differentiate between a firewall and IDS? 14. Which type of security threat is hidden in software that appears to do one thing, and yet behind the scenes it does another? 15. What is data encryption? 16. What is a card key? 17. A person who is able to gain access to equipment or a network by tricking people into providing the necessary access information. 18. Compare hardware and software firewalls.(3) 19. Describe the different types of backups?(5) 20. Which type of security threat is attached to small pieces of computer code, software, or documents and has the potential to corrupt or even delete files on your computer? 21. What is a key fob? 22. What is the use of conduits in security? 23. What is the use of log files in security? 24. What is a biometric? 25. What DOS command is used for databackup?

You might also like