Deck 18: Security Strategies

ملء الشاشة (f)
exit full mode
سؤال
An RFID badge is related to which type of authentication method?

A) smart card
B) biometric scanner
C) digital certificate
D) privacy filter
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What keystroke should you press to get a logon window if you don't use the welcome screen?

A) Alt+F1
B) Ctrl+Ins+Home
C) Alt+F5+End
D) Ctrl+Alt+Delete
سؤال
Which of the following is true about the Windows Encrypted File System?

A) files can be marked for encryption, but not folders
B) an encrypted file moved to an unencrypted folder remains encrypted
C) EFS only works on NTFS and FAT32
D) you need to download special software to use EFS
سؤال
Using Group Policy, you can set security policies to help secure a workstation.
سؤال
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

A) shoulder surfing
B) tailgating
C) social engineering
D) session hijacking
سؤال
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
سؤال
It's usually a good idea to run several anti-malware programs at the same time on your computer.
سؤال
A privacy filter is used for what aspect of security?

A) theft of a laptop
B) computer authentication
C) data encryption
D) screen viewing
سؤال
On a peer-to-peer network, authentication is the responsibility of the domain.
سؤال
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

A) retinal scanner
B) LoJack token
C) smart card
D) TPM
سؤال
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

A) Trojan horse
B) rootkit
C) adware
D) worm
سؤال
Which of the following is true about the Guest account in Windows 7?

A) it is disabled by default
B) it automatically has a complex password
C) you cannot rename it
D) it has administrative access
سؤال
Which of the following is true about passwords.

A) it's best to write your password down so you don't get locked out of your computer
B) passwords cannot be longer than 14 characters
C) by default, accounts with a blank password cannot logon remotely
D) letters and numbers are allowed, but no symbols such as '@' or '!'
سؤال
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

A) ATA Secure Erase
B) low-level format
C) degausser
D) magnetic data filter
سؤال
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
سؤال
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?

A) fixmbr
B) bootrec \fixmbr
C) fixboot
D) bootrec \fixboot
سؤال
Which type of malware hides in the MBR program of a hard drive?

A) boot sector virus
B) Trojan horse
C) keylogger
D) spyware
سؤال
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

A) a USB port
B) an authentication key on the hard drive
C) a TPM chip on the motherboard
D) a PIN on the BIOS
سؤال
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

A) Windows POP technology
B) the BIOS
C) a feature available on some DVD drives
D) your USB keyboard
سؤال
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?

A) you can rename default user accounts
B) you can require user accounts to have non-blank passwords
C) you can use gpedit.msc to see if any policies conflict
D) you can disable logon scripts
سؤال
What are the risks in using BitLocker to secure your system and how can you mitigate these risks?
سؤال
There are eight criteria for creating a strong password. List five of them.
سؤال
To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks.
سؤال
Describe file and folder encryption in Windows (not how you encrypt a file).
سؤال
Match between columns
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
social engineering
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
worm
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
Trojan
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
grayware
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
digital certificate
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
RSA tokens
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
virus signature
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
tailgating
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
adware
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
keylogger
a code used to identify and authenticate a person or organization sending data over a network
social engineering
a code used to identify and authenticate a person or organization sending data over a network
worm
a code used to identify and authenticate a person or organization sending data over a network
Trojan
a code used to identify and authenticate a person or organization sending data over a network
grayware
a code used to identify and authenticate a person or organization sending data over a network
digital certificate
a code used to identify and authenticate a person or organization sending data over a network
RSA tokens
a code used to identify and authenticate a person or organization sending data over a network
virus signature
a code used to identify and authenticate a person or organization sending data over a network
tailgating
a code used to identify and authenticate a person or organization sending data over a network
adware
a code used to identify and authenticate a person or organization sending data over a network
keylogger
a program that AV software recognizes to be potentially harmful or potentially unwanted
social engineering
a program that AV software recognizes to be potentially harmful or potentially unwanted
worm
a program that AV software recognizes to be potentially harmful or potentially unwanted
Trojan
a program that AV software recognizes to be potentially harmful or potentially unwanted
grayware
a program that AV software recognizes to be potentially harmful or potentially unwanted
digital certificate
a program that AV software recognizes to be potentially harmful or potentially unwanted
RSA tokens
a program that AV software recognizes to be potentially harmful or potentially unwanted
virus signature
a program that AV software recognizes to be potentially harmful or potentially unwanted
tailgating
a program that AV software recognizes to be potentially harmful or potentially unwanted
adware
a program that AV software recognizes to be potentially harmful or potentially unwanted
keylogger
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
social engineering
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
worm
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
Trojan
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
grayware
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
digital certificate
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
RSA tokens
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
virus signature
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
tailgating
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
adware
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
keylogger
type of smart card that contains authentication information
social engineering
type of smart card that contains authentication information
worm
type of smart card that contains authentication information
Trojan
type of smart card that contains authentication information
grayware
type of smart card that contains authentication information
digital certificate
type of smart card that contains authentication information
RSA tokens
type of smart card that contains authentication information
virus signature
type of smart card that contains authentication information
tailgating
type of smart card that contains authentication information
adware
type of smart card that contains authentication information
keylogger
software installed on a computer that produces pop-up ads using your browser
social engineering
software installed on a computer that produces pop-up ads using your browser
worm
software installed on a computer that produces pop-up ads using your browser
Trojan
software installed on a computer that produces pop-up ads using your browser
grayware
software installed on a computer that produces pop-up ads using your browser
digital certificate
software installed on a computer that produces pop-up ads using your browser
RSA tokens
software installed on a computer that produces pop-up ads using your browser
virus signature
software installed on a computer that produces pop-up ads using your browser
tailgating
software installed on a computer that produces pop-up ads using your browser
adware
software installed on a computer that produces pop-up ads using your browser
keylogger
A type of malware that tricks you into opening it by substituting itself for a legitimate program
social engineering
A type of malware that tricks you into opening it by substituting itself for a legitimate program
worm
A type of malware that tricks you into opening it by substituting itself for a legitimate program
Trojan
A type of malware that tricks you into opening it by substituting itself for a legitimate program
grayware
A type of malware that tricks you into opening it by substituting itself for a legitimate program
digital certificate
A type of malware that tricks you into opening it by substituting itself for a legitimate program
RSA tokens
A type of malware that tricks you into opening it by substituting itself for a legitimate program
virus signature
A type of malware that tricks you into opening it by substituting itself for a legitimate program
tailgating
A type of malware that tricks you into opening it by substituting itself for a legitimate program
adware
A type of malware that tricks you into opening it by substituting itself for a legitimate program
keylogger
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
social engineering
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
worm
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Trojan
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
grayware
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
digital certificate
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
RSA tokens
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
virus signature
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
tailgating
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
adware
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
keylogger
when someone who is unauthorized follows the employee through a secured entrance to a room or building
social engineering
when someone who is unauthorized follows the employee through a secured entrance to a room or building
worm
when someone who is unauthorized follows the employee through a secured entrance to a room or building
Trojan
when someone who is unauthorized follows the employee through a secured entrance to a room or building
grayware
when someone who is unauthorized follows the employee through a secured entrance to a room or building
digital certificate
when someone who is unauthorized follows the employee through a secured entrance to a room or building
RSA tokens
when someone who is unauthorized follows the employee through a secured entrance to a room or building
virus signature
when someone who is unauthorized follows the employee through a secured entrance to a room or building
tailgating
when someone who is unauthorized follows the employee through a secured entrance to a room or building
adware
when someone who is unauthorized follows the employee through a secured entrance to a room or building
keylogger
type of spyware that tracks your keystrokes, including passwords
social engineering
type of spyware that tracks your keystrokes, including passwords
worm
type of spyware that tracks your keystrokes, including passwords
Trojan
type of spyware that tracks your keystrokes, including passwords
grayware
type of spyware that tracks your keystrokes, including passwords
digital certificate
type of spyware that tracks your keystrokes, including passwords
RSA tokens
type of spyware that tracks your keystrokes, including passwords
virus signature
type of spyware that tracks your keystrokes, including passwords
tailgating
type of spyware that tracks your keystrokes, including passwords
adware
type of spyware that tracks your keystrokes, including passwords
keylogger
سؤال
Windows _______________ is antispyware included in Windows 7\Vista.
سؤال
With respect to the default users and password settings, how can you use Group Policy to make your system more secure?
سؤال
The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network.
سؤال
What are two methods users can use to lock down their computer?
سؤال
To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired or wireless network.
سؤال
Describe Windows Firewall.
سؤال
List three varieties of smart cards.
سؤال
Under what circumstances can a blank password be more secure than a non-blank password?
سؤال
Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.
سؤال
What is a rootkit and why is it so difficult to detect?
سؤال
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?

A) Task Manager
B) SearchIndexer
C) Process Explorer
D) Windows Defender
سؤال
The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network's computers.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/37
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 18: Security Strategies
1
An RFID badge is related to which type of authentication method?

A) smart card
B) biometric scanner
C) digital certificate
D) privacy filter
A
2
What keystroke should you press to get a logon window if you don't use the welcome screen?

A) Alt+F1
B) Ctrl+Ins+Home
C) Alt+F5+End
D) Ctrl+Alt+Delete
D
3
Which of the following is true about the Windows Encrypted File System?

A) files can be marked for encryption, but not folders
B) an encrypted file moved to an unencrypted folder remains encrypted
C) EFS only works on NTFS and FAT32
D) you need to download special software to use EFS
B
4
Using Group Policy, you can set security policies to help secure a workstation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
5
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

A) shoulder surfing
B) tailgating
C) social engineering
D) session hijacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
6
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
7
It's usually a good idea to run several anti-malware programs at the same time on your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
8
A privacy filter is used for what aspect of security?

A) theft of a laptop
B) computer authentication
C) data encryption
D) screen viewing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
9
On a peer-to-peer network, authentication is the responsibility of the domain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
10
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

A) retinal scanner
B) LoJack token
C) smart card
D) TPM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

A) Trojan horse
B) rootkit
C) adware
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is true about the Guest account in Windows 7?

A) it is disabled by default
B) it automatically has a complex password
C) you cannot rename it
D) it has administrative access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is true about passwords.

A) it's best to write your password down so you don't get locked out of your computer
B) passwords cannot be longer than 14 characters
C) by default, accounts with a blank password cannot logon remotely
D) letters and numbers are allowed, but no symbols such as '@' or '!'
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

A) ATA Secure Erase
B) low-level format
C) degausser
D) magnetic data filter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
15
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?

A) fixmbr
B) bootrec \fixmbr
C) fixboot
D) bootrec \fixboot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which type of malware hides in the MBR program of a hard drive?

A) boot sector virus
B) Trojan horse
C) keylogger
D) spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
18
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

A) a USB port
B) an authentication key on the hard drive
C) a TPM chip on the motherboard
D) a PIN on the BIOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
19
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

A) Windows POP technology
B) the BIOS
C) a feature available on some DVD drives
D) your USB keyboard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?

A) you can rename default user accounts
B) you can require user accounts to have non-blank passwords
C) you can use gpedit.msc to see if any policies conflict
D) you can disable logon scripts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
21
What are the risks in using BitLocker to secure your system and how can you mitigate these risks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
22
There are eight criteria for creating a strong password. List five of them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
23
To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
24
Describe file and folder encryption in Windows (not how you encrypt a file).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match between columns
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
social engineering
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
worm
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
Trojan
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
grayware
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
digital certificate
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
RSA tokens
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
virus signature
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
tailgating
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
adware
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
keylogger
a code used to identify and authenticate a person or organization sending data over a network
social engineering
a code used to identify and authenticate a person or organization sending data over a network
worm
a code used to identify and authenticate a person or organization sending data over a network
Trojan
a code used to identify and authenticate a person or organization sending data over a network
grayware
a code used to identify and authenticate a person or organization sending data over a network
digital certificate
a code used to identify and authenticate a person or organization sending data over a network
RSA tokens
a code used to identify and authenticate a person or organization sending data over a network
virus signature
a code used to identify and authenticate a person or organization sending data over a network
tailgating
a code used to identify and authenticate a person or organization sending data over a network
adware
a code used to identify and authenticate a person or organization sending data over a network
keylogger
a program that AV software recognizes to be potentially harmful or potentially unwanted
social engineering
a program that AV software recognizes to be potentially harmful or potentially unwanted
worm
a program that AV software recognizes to be potentially harmful or potentially unwanted
Trojan
a program that AV software recognizes to be potentially harmful or potentially unwanted
grayware
a program that AV software recognizes to be potentially harmful or potentially unwanted
digital certificate
a program that AV software recognizes to be potentially harmful or potentially unwanted
RSA tokens
a program that AV software recognizes to be potentially harmful or potentially unwanted
virus signature
a program that AV software recognizes to be potentially harmful or potentially unwanted
tailgating
a program that AV software recognizes to be potentially harmful or potentially unwanted
adware
a program that AV software recognizes to be potentially harmful or potentially unwanted
keylogger
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
social engineering
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
worm
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
Trojan
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
grayware
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
digital certificate
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
RSA tokens
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
virus signature
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
tailgating
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
adware
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
keylogger
type of smart card that contains authentication information
social engineering
type of smart card that contains authentication information
worm
type of smart card that contains authentication information
Trojan
type of smart card that contains authentication information
grayware
type of smart card that contains authentication information
digital certificate
type of smart card that contains authentication information
RSA tokens
type of smart card that contains authentication information
virus signature
type of smart card that contains authentication information
tailgating
type of smart card that contains authentication information
adware
type of smart card that contains authentication information
keylogger
software installed on a computer that produces pop-up ads using your browser
social engineering
software installed on a computer that produces pop-up ads using your browser
worm
software installed on a computer that produces pop-up ads using your browser
Trojan
software installed on a computer that produces pop-up ads using your browser
grayware
software installed on a computer that produces pop-up ads using your browser
digital certificate
software installed on a computer that produces pop-up ads using your browser
RSA tokens
software installed on a computer that produces pop-up ads using your browser
virus signature
software installed on a computer that produces pop-up ads using your browser
tailgating
software installed on a computer that produces pop-up ads using your browser
adware
software installed on a computer that produces pop-up ads using your browser
keylogger
A type of malware that tricks you into opening it by substituting itself for a legitimate program
social engineering
A type of malware that tricks you into opening it by substituting itself for a legitimate program
worm
A type of malware that tricks you into opening it by substituting itself for a legitimate program
Trojan
A type of malware that tricks you into opening it by substituting itself for a legitimate program
grayware
A type of malware that tricks you into opening it by substituting itself for a legitimate program
digital certificate
A type of malware that tricks you into opening it by substituting itself for a legitimate program
RSA tokens
A type of malware that tricks you into opening it by substituting itself for a legitimate program
virus signature
A type of malware that tricks you into opening it by substituting itself for a legitimate program
tailgating
A type of malware that tricks you into opening it by substituting itself for a legitimate program
adware
A type of malware that tricks you into opening it by substituting itself for a legitimate program
keylogger
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
social engineering
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
worm
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Trojan
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
grayware
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
digital certificate
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
RSA tokens
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
virus signature
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
tailgating
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
adware
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
keylogger
when someone who is unauthorized follows the employee through a secured entrance to a room or building
social engineering
when someone who is unauthorized follows the employee through a secured entrance to a room or building
worm
when someone who is unauthorized follows the employee through a secured entrance to a room or building
Trojan
when someone who is unauthorized follows the employee through a secured entrance to a room or building
grayware
when someone who is unauthorized follows the employee through a secured entrance to a room or building
digital certificate
when someone who is unauthorized follows the employee through a secured entrance to a room or building
RSA tokens
when someone who is unauthorized follows the employee through a secured entrance to a room or building
virus signature
when someone who is unauthorized follows the employee through a secured entrance to a room or building
tailgating
when someone who is unauthorized follows the employee through a secured entrance to a room or building
adware
when someone who is unauthorized follows the employee through a secured entrance to a room or building
keylogger
type of spyware that tracks your keystrokes, including passwords
social engineering
type of spyware that tracks your keystrokes, including passwords
worm
type of spyware that tracks your keystrokes, including passwords
Trojan
type of spyware that tracks your keystrokes, including passwords
grayware
type of spyware that tracks your keystrokes, including passwords
digital certificate
type of spyware that tracks your keystrokes, including passwords
RSA tokens
type of spyware that tracks your keystrokes, including passwords
virus signature
type of spyware that tracks your keystrokes, including passwords
tailgating
type of spyware that tracks your keystrokes, including passwords
adware
type of spyware that tracks your keystrokes, including passwords
keylogger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
26
Windows _______________ is antispyware included in Windows 7\Vista.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
27
With respect to the default users and password settings, how can you use Group Policy to make your system more secure?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
28
The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
29
What are two methods users can use to lock down their computer?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
30
To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired or wireless network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
31
Describe Windows Firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
32
List three varieties of smart cards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
33
Under what circumstances can a blank password be more secure than a non-blank password?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
34
Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
35
What is a rootkit and why is it so difficult to detect?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
36
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?

A) Task Manager
B) SearchIndexer
C) Process Explorer
D) Windows Defender
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
37
The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network's computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.