Deck 18: Security Strategies

ملء الشاشة (f)
exit full mode
سؤال
 Using Group Policy, you can set security policies to help secure a workstation.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
 What does the presence of the Cydia app on an iOS device indicate?

A) A rootkit has been installed on the device
B) The device is infected with a worm
C) The device has been jailbroken
D) There is spyware software installed on the device
سؤال
 Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?

A) rootkits
B) malware signatures
C) static updates
D) Windows updates
سؤال
 On a peer-to-peer network, authentication is the responsibility of the domain.
سؤال
 What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

A) Trojan horse
B) rootkit
C) adware
D) worm
سؤال
 What technology can be used to locate a device such as a laptop after it has been stolen?

A) Management software
B) LoJack
C) Trojan
D) Multifactor Trace software
سؤال
 What statement regarding passwords on Windows is accurate?

A) it's best to write your password down so you don't get locked out of your computer
B) passwords cannot be longer than 14 characters
C) by default, accounts with a blank password cannot logon remotely
D) letters and numbers are allowed, but no symbols such as '@' or '!'
سؤال
 One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

A) retinal scanner
B) LoJack token
C) smart card
D) TPM
سؤال
) What command can be used to take full access of a file?

A) takeown
B) attrib
C) perms
D) icacls
سؤال
 What keystroke should you press to get a logon window if you don't use the welcome screen?

A) Alt+F1
B) Ctrl+Ins+Home
C) Alt+F5+End
D) Ctrl+Alt+Delete
سؤال
) If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

A) a USB port
B) an authentication key on the hard drive
C) a TPM chip on the motherboard
D) a PIN on the BIOS
سؤال
 A root certificate is the original certificate issued by the CA.
سؤال
 When using the Windows Encrypted File System, what statement is accurate?

A) files can be marked for encryption, but not folders
B) an encrypted file moved to an unencrypted folder remains encrypted
C) EFS only works on NTFS and FAT32
D) you need to download special software to use EFS
سؤال
 What statement is true regarding the Guest account in Windows 7?

A) it is disabled by default
B) it automatically has a complex password
C) you cannot rename it
D) it has administrative access
سؤال
 When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?

A) rootkit
B) zombie
C) brute-force
D) man-in-the-middle
سؤال
 If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

A) Windows POP technology
B) the BIOS
C) a feature available on some DVD drives
D) your USB keyboard
سؤال
 What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

A) ATA Secure Erase
B) low-level format
C) degausser
D) magnetic data filter
سؤال
 You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

A) shoulder surfing
B) tailgating
C) social engineering
D) session hijacking
سؤال
 After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
سؤال
 Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
سؤال
 What are some of the ways you can use BitLocker Encryption? (Choose all that apply.)

A) computer authentication using TPM
B) user authentication using a certificate
C) user authentication using a USB flash drive
D) computer and user authentication using a PIN and TPM
سؤال
 A person that secretly peaks at your monitor screen while you work may be doing what?

A) tailgating
B) screen capping
C) shoulder surfing
D) social engineering
سؤال
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
سؤال
 What software program is an example of password management software? (Choose all that apply.)

A) KeePass
B) LastPass
C) Dashlane
D) PassLock
سؤال
 What inputs would be considered to be part of a biometric device? (Choose all that apply.)

A) keystrokes
B) retina
C) fingerprint
D) voice
سؤال
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 a code used to identify and authenticate a person or organization sending data over a network
سؤال
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 type of spyware that tracks your keystrokes, including passwords
سؤال
) When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.)

A) The password should be at least eight characters long.
B) You should not use adjacent keys on the keyboard, such as asdf.
C) You should combine uppercase and lower case letters, numbers, and symbols.
D) You can use words from a foreign language to make the password more secure.
سؤال
 What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.)

A) press Ctrl+End and click Logon Screen
B) press Windows key + L
C) press Ctrl+Alt+Delete and click Lock this Computer
D) Press F1 and click Sleep
سؤال
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
سؤال
 Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term?

A) evidence security roster
B) chain of custody
C) item inventory
D) evidence tracking list
سؤال
 What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?

A) copyright
B) license
C) user agreement
D) cease and desist order
سؤال
 CryptoLocker is an example of what type of malware?

A) zero-day attack
B) worm
C) ransomware
D) man-in-the-middle
سؤال
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 software installed on a computer that produces pop-up ads using your browser
سؤال
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 A program that is potentially harmful or potentially unwanted
سؤال
 Using a PIN or password in addition to TPM is an example of what type of authentication?

A) multifactor
B) biometric
C) asymmetric
D) symmetric
سؤال
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
. an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
سؤال
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 A type of malware that tricks you into opening it by substituting itself for a legitimate program
سؤال
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 when someone who is unauthorized follows the employee through a secured entrance to a room or building
سؤال
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 an attack that can be used to crack a long password by trying words and word combinations
سؤال
 What are the risks in using BitLocker to secure your system and how can you mitigate these risks?
سؤال
. If you wish to monitor logon failures, what should you do?
سؤال
 Describe Windows Firewall.
سؤال
 What is a rootkit and why is it so difficult to detect?
سؤال
 What is a Trojan, and how is it installed?
سؤال
 Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.
سؤال
 List five of the different criteria that make up a secure password?
سؤال
 Describe file and folder encryption in Windows (not how you encrypt a file).
سؤال
 With respect to the default users and password settings, how can you use Group Policy to make your system more secure?
سؤال
 Under what circumstances can a blank password be more secure than a non-blank password?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 18: Security Strategies
1
 Using Group Policy, you can set security policies to help secure a workstation.
True
2
 What does the presence of the Cydia app on an iOS device indicate?

A) A rootkit has been installed on the device
B) The device is infected with a worm
C) The device has been jailbroken
D) There is spyware software installed on the device
C
3
 Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?

A) rootkits
B) malware signatures
C) static updates
D) Windows updates
B
4
 On a peer-to-peer network, authentication is the responsibility of the domain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
 What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

A) Trojan horse
B) rootkit
C) adware
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
 What technology can be used to locate a device such as a laptop after it has been stolen?

A) Management software
B) LoJack
C) Trojan
D) Multifactor Trace software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
 What statement regarding passwords on Windows is accurate?

A) it's best to write your password down so you don't get locked out of your computer
B) passwords cannot be longer than 14 characters
C) by default, accounts with a blank password cannot logon remotely
D) letters and numbers are allowed, but no symbols such as '@' or '!'
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
 One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

A) retinal scanner
B) LoJack token
C) smart card
D) TPM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
) What command can be used to take full access of a file?

A) takeown
B) attrib
C) perms
D) icacls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
 What keystroke should you press to get a logon window if you don't use the welcome screen?

A) Alt+F1
B) Ctrl+Ins+Home
C) Alt+F5+End
D) Ctrl+Alt+Delete
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
) If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

A) a USB port
B) an authentication key on the hard drive
C) a TPM chip on the motherboard
D) a PIN on the BIOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
 A root certificate is the original certificate issued by the CA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
 When using the Windows Encrypted File System, what statement is accurate?

A) files can be marked for encryption, but not folders
B) an encrypted file moved to an unencrypted folder remains encrypted
C) EFS only works on NTFS and FAT32
D) you need to download special software to use EFS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
 What statement is true regarding the Guest account in Windows 7?

A) it is disabled by default
B) it automatically has a complex password
C) you cannot rename it
D) it has administrative access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
 When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?

A) rootkit
B) zombie
C) brute-force
D) man-in-the-middle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
 If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

A) Windows POP technology
B) the BIOS
C) a feature available on some DVD drives
D) your USB keyboard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
 What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

A) ATA Secure Erase
B) low-level format
C) degausser
D) magnetic data filter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
 You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

A) shoulder surfing
B) tailgating
C) social engineering
D) session hijacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
 After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
 Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
 What are some of the ways you can use BitLocker Encryption? (Choose all that apply.)

A) computer authentication using TPM
B) user authentication using a certificate
C) user authentication using a USB flash drive
D) computer and user authentication using a PIN and TPM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
 A person that secretly peaks at your monitor screen while you work may be doing what?

A) tailgating
B) screen capping
C) shoulder surfing
D) social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
 What software program is an example of password management software? (Choose all that apply.)

A) KeePass
B) LastPass
C) Dashlane
D) PassLock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
 What inputs would be considered to be part of a biometric device? (Choose all that apply.)

A) keystrokes
B) retina
C) fingerprint
D) voice
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 a code used to identify and authenticate a person or organization sending data over a network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 type of spyware that tracks your keystrokes, including passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
) When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.)

A) The password should be at least eight characters long.
B) You should not use adjacent keys on the keyboard, such as asdf.
C) You should combine uppercase and lower case letters, numbers, and symbols.
D) You can use words from a foreign language to make the password more secure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
 What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.)

A) press Ctrl+End and click Logon Screen
B) press Windows key + L
C) press Ctrl+Alt+Delete and click Lock this Computer
D) Press F1 and click Sleep
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
 Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term?

A) evidence security roster
B) chain of custody
C) item inventory
D) evidence tracking list
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
 What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?

A) copyright
B) license
C) user agreement
D) cease and desist order
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
 CryptoLocker is an example of what type of malware?

A) zero-day attack
B) worm
C) ransomware
D) man-in-the-middle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 software installed on a computer that produces pop-up ads using your browser
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 A program that is potentially harmful or potentially unwanted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
 Using a PIN or password in addition to TPM is an example of what type of authentication?

A) multifactor
B) biometric
C) asymmetric
D) symmetric
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
. an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 A type of malware that tricks you into opening it by substituting itself for a legitimate program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 when someone who is unauthorized follows the employee through a secured entrance to a room or building
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Matching
Match each item with a statement below.
a. adware
b. digital certificate
c. grayware
d. keylogger
e. dictionary attack
f. social engineering
g. tailgating
h. Trojan
i. zombie
j. Worm
 an attack that can be used to crack a long password by trying words and word combinations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
 What are the risks in using BitLocker to secure your system and how can you mitigate these risks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
. If you wish to monitor logon failures, what should you do?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
 Describe Windows Firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
 What is a rootkit and why is it so difficult to detect?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
 What is a Trojan, and how is it installed?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
 Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
 List five of the different criteria that make up a secure password?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
 Describe file and folder encryption in Windows (not how you encrypt a file).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
 With respect to the default users and password settings, how can you use Group Policy to make your system more secure?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
 Under what circumstances can a blank password be more secure than a non-blank password?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.