Test Preview

  1. What is a drive-by download?
  1. What type of encryption should be used on a wireless router?
  1. Operating system hardening relates to the removal of unnecessary software and functions from computers and servers.
  1. What is a brute force attack?
  1. When should an office prepare incident response and disaster recovery plans?
  1. Daisy-chaining refers to ____________.
  1. An in-person attempt by a hacker to effectively talk his or her way inside your office is called ____________.
  1. What steps should you take with regard to an employee’s network access when he or she stops working at your office (regardless of reason)?
  1. What is “spoofing”?
  1. The “Cloud” is simply someone else’s computer accessed via the Internet.
  1. An Incident Response Procedure should include all of the following EXCEPT ____________.
  1. Which one of these is the best password?
  1. Which of these is a serious problem often seen in Internet-connected medical devices?
  1. What is the difference between a Business Continuity Plan (BCP) and a Disaster Recovery Plan (DRP)?
  1. Which one is NOT a mistake that could lead to the inadvertent disclosure of PHI?
  1. What is smishing?
  1. Why is it important to have as few network administrator accounts as possible?
  1. If you find a CD with your organization’s logo labeled “Employee Salaries” in a parking area adjacent to your office, this is most likely an example of what kind of social engineering attack?