Deck 18: Security Strategies
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/37
Play
Full screen (f)
Deck 18: Security Strategies
1
An RFID badge is related to which type of authentication method?
A) smart card
B) biometric scanner
C) digital certificate
D) privacy filter
A) smart card
B) biometric scanner
C) digital certificate
D) privacy filter
A
2
What keystroke should you press to get a logon window if you don't use the welcome screen?
A) Alt+F1
B) Ctrl+Ins+Home
C) Alt+F5+End
D) Ctrl+Alt+Delete
A) Alt+F1
B) Ctrl+Ins+Home
C) Alt+F5+End
D) Ctrl+Alt+Delete
D
3
Which of the following is true about the Windows Encrypted File System?
A) files can be marked for encryption, but not folders
B) an encrypted file moved to an unencrypted folder remains encrypted
C) EFS only works on NTFS and FAT32
D) you need to download special software to use EFS
A) files can be marked for encryption, but not folders
B) an encrypted file moved to an unencrypted folder remains encrypted
C) EFS only works on NTFS and FAT32
D) you need to download special software to use EFS
B
4
Using Group Policy, you can set security policies to help secure a workstation.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
5
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
A) shoulder surfing
B) tailgating
C) social engineering
D) session hijacking
A) shoulder surfing
B) tailgating
C) social engineering
D) session hijacking
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
6
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
7
It's usually a good idea to run several anti-malware programs at the same time on your computer.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
8
A privacy filter is used for what aspect of security?
A) theft of a laptop
B) computer authentication
C) data encryption
D) screen viewing
A) theft of a laptop
B) computer authentication
C) data encryption
D) screen viewing
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
9
On a peer-to-peer network, authentication is the responsibility of the domain.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
10
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
A) retinal scanner
B) LoJack token
C) smart card
D) TPM
A) retinal scanner
B) LoJack token
C) smart card
D) TPM
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
11
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
A) Trojan horse
B) rootkit
C) adware
D) worm
A) Trojan horse
B) rootkit
C) adware
D) worm
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is true about the Guest account in Windows 7?
A) it is disabled by default
B) it automatically has a complex password
C) you cannot rename it
D) it has administrative access
A) it is disabled by default
B) it automatically has a complex password
C) you cannot rename it
D) it has administrative access
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is true about passwords.
A) it's best to write your password down so you don't get locked out of your computer
B) passwords cannot be longer than 14 characters
C) by default, accounts with a blank password cannot logon remotely
D) letters and numbers are allowed, but no symbols such as '@' or '!'
A) it's best to write your password down so you don't get locked out of your computer
B) passwords cannot be longer than 14 characters
C) by default, accounts with a blank password cannot logon remotely
D) letters and numbers are allowed, but no symbols such as '@' or '!'
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
A) ATA Secure Erase
B) low-level format
C) degausser
D) magnetic data filter
A) ATA Secure Erase
B) low-level format
C) degausser
D) magnetic data filter
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
15
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
16
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
A) fixmbr
B) bootrec \fixmbr
C) fixboot
D) bootrec \fixboot
A) fixmbr
B) bootrec \fixmbr
C) fixboot
D) bootrec \fixboot
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
17
Which type of malware hides in the MBR program of a hard drive?
A) boot sector virus
B) Trojan horse
C) keylogger
D) spyware
A) boot sector virus
B) Trojan horse
C) keylogger
D) spyware
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
18
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
A) a USB port
B) an authentication key on the hard drive
C) a TPM chip on the motherboard
D) a PIN on the BIOS
A) a USB port
B) an authentication key on the hard drive
C) a TPM chip on the motherboard
D) a PIN on the BIOS
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
19
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
A) Windows POP technology
B) the BIOS
C) a feature available on some DVD drives
D) your USB keyboard
A) Windows POP technology
B) the BIOS
C) a feature available on some DVD drives
D) your USB keyboard
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?
A) you can rename default user accounts
B) you can require user accounts to have non-blank passwords
C) you can use gpedit.msc to see if any policies conflict
D) you can disable logon scripts
A) you can rename default user accounts
B) you can require user accounts to have non-blank passwords
C) you can use gpedit.msc to see if any policies conflict
D) you can disable logon scripts
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
21
What are the risks in using BitLocker to secure your system and how can you mitigate these risks?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
22
There are eight criteria for creating a strong password. List five of them.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
23
To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
24
Describe file and folder encryption in Windows (not how you encrypt a file).
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
25
Match between columns
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
26
Windows _______________ is antispyware included in Windows 7\Vista.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
27
With respect to the default users and password settings, how can you use Group Policy to make your system more secure?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
28
The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
29
What are two methods users can use to lock down their computer?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
30
To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired or wireless network.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
31
Describe Windows Firewall.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
32
List three varieties of smart cards.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
33
Under what circumstances can a blank password be more secure than a non-blank password?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
34
Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
35
What is a rootkit and why is it so difficult to detect?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
36
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
A) Task Manager
B) SearchIndexer
C) Process Explorer
D) Windows Defender
A) Task Manager
B) SearchIndexer
C) Process Explorer
D) Windows Defender
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
37
The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network's computers.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck