a.
Previous logon notificationb.
Concurrent session controlc.
Session lockd.
Session termination266. Which of the following violates a user’s privacy?
a.
Freewareb.
Firmwarec.
Spywared.
CripplewareFreeware is incorrect because it is software made available to the public at no cost, but the author retains the copyright and can place restrictions on how the program is used. Some freeware can be harmless whereas others are harmful. Not all freeware violates a user’s privacy.
Firmware is incorrect because it is software that is permanently stored in a hardware device, which enables reading but not writing or modifying. The most common device for firmware is read-only-memory (ROM).
Crippleware is incorrect because it enables trial (limited) versions of vendor products that operate only for a limited period of time. Crippleware does not violate a user’s privacy.
267. Network-based intrusion prevention systems (IPS) are typically deployed:
a.
Inlineb.
Outlinec.
Onlined.
Offline268. Identity thieves can get personal information through which of the following means?
1.
Dumpster diving2.
Skimming3.
Phishing4.
Pretextinga.
1 onlyb.
3 onlyc.
1 and 3d.
1, 2, 3, and 4Skimming includes stealing credit card or debit card numbers by capturing the information in a data storage device. Phishing and pretexting deal with stealing information through e-mail or phone by posing as legitimate companies and claiming that you have a problem with your account. This practice is known as phishing online or pretexting (social engineering) by phone respectively.
269. Which of the following application-related authentication types is risky?
a.
External authenticationb.
Proprietary authenticationc.
Pass-through authenticationd.
Host/user authenticationExternal authentication is incorrect because it uses a directory server, which is not risky. Proprietary authentication is incorrect because username and passwords are part of the application, not the operating system. This is less risky. Host/user authentication is incorrect because it is performed within a controlled environment (e.g., managed workstations and servers within an organization). Some applications may rely on previous authentication performed by the operating system. This is less risky.
270. Inference attacks are based on which of the following?
a.
Hardware and softwareb.
Firmware and freewarec.
Data and informationd.
Middleware and courseware