Deck 10: Security Strategies

Full screen (f)
exit full mode
Question
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?

A) rootkit
B) zombie
C) brute-force
D) man-in-the-middle
Use Space or
up arrow
down arrow
to flip the card.
Question
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

A) Trojan horse
B) rootkit
C) adware
D) worm
Question
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

A) Windows POP technology
B) the BIOS
C) a feature available on some DVD drives
D) your USB keyboard
Question
What command can be used to take full access of a file?

A) takeown
B) attrib
C) perms
D) icacls
Question
What statement is true regarding the Guest account in Windows 7?

A) it is disabled by default
B) it automatically has a complex password
C) you cannot rename it
D) it has administrative access
Question
What does the presence of the Cydia app on an iOS device indicate?

A) A rootkit has been installed on the device
B) The device is infected with a worm
C) The device has been jailbroken
D) There is spyware software installed on the device
Question
What statement regarding passwords on Windows is accurate?

A) it's best to write your password down so you don't get locked out of your computer
B) passwords cannot be longer than 14 characters
C) by default, accounts with a blank password cannot logon remotely
D) letters and numbers are allowed, but no symbols such as '@' or '!'
Question
When using the Windows Encrypted File System, what statement is accurate?

A) files can be marked for encryption, but not folders
B) an encrypted file moved to an unencrypted folder remains encrypted
C) EFS only works on NTFS and FAT32
D) you need to download special software to use EFS
Question
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

A) ATA Secure Erase
B) low-level format
C) degausser
D) magnetic data filter
Question
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
Question
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

A) shoulder surfing
B) tailgating
C) social engineering
D) session hijacking
Question
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

A) retinal scanner
B) LoJack token
C) smart card
D) TPM
Question
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
Question
What keystroke should you press to get a logon window if you don't use the welcome screen?

A) Alt+F1
B) Ctrl+Ins+Home
C) Alt+F5+End
D) Ctrl+Alt+Delete
Question
Using Group Policy, you can set security policies to help secure a workstation.
Question
A root certificate is the original certificate issued by the CA.
Question
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

A) a USB port
B) an authentication key on the hard drive
C) a TPM chip on the motherboard
D) a PIN on the BIOS
Question
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?

A) rootkits
B) malware signatures
C) static updates
D) Windows updates
Question
What technology can be used to locate a device such as a laptop after it has been stolen?

A) Management software
B) LoJack
C) Trojan
D) Multifactor Trace software
Question
On a peer-to-peer network, authentication is the responsibility of the domain.
Question
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term?

A) evidence security roster
B) chain of custody
C) item inventory
D) evidence tracking list
Question
Match between columns
a code used to identify and authenticate a person or organization sending data over a network
adware
a code used to identify and authenticate a person or organization sending data over a network
digital certificate
a code used to identify and authenticate a person or organization sending data over a network
grayware
a code used to identify and authenticate a person or organization sending data over a network
keylogger
a code used to identify and authenticate a person or organization sending data over a network
dictionary attack
a code used to identify and authenticate a person or organization sending data over a network
social engineering
a code used to identify and authenticate a person or organization sending data over a network
tailgating
a code used to identify and authenticate a person or organization sending data over a network
Trojan
a code used to identify and authenticate a person or organization sending data over a network
zombie
a code used to identify and authenticate a person or organization sending data over a network
worm
A type of malware that tricks you into opening it by substituting itself for a legitimate program
adware
A type of malware that tricks you into opening it by substituting itself for a legitimate program
digital certificate
A type of malware that tricks you into opening it by substituting itself for a legitimate program
grayware
A type of malware that tricks you into opening it by substituting itself for a legitimate program
keylogger
A type of malware that tricks you into opening it by substituting itself for a legitimate program
dictionary attack
A type of malware that tricks you into opening it by substituting itself for a legitimate program
social engineering
A type of malware that tricks you into opening it by substituting itself for a legitimate program
tailgating
A type of malware that tricks you into opening it by substituting itself for a legitimate program
Trojan
A type of malware that tricks you into opening it by substituting itself for a legitimate program
zombie
A type of malware that tricks you into opening it by substituting itself for a legitimate program
worm
when someone who is unauthorized follows the employee through a secured entrance to a room or building
adware
when someone who is unauthorized follows the employee through a secured entrance to a room or building
digital certificate
when someone who is unauthorized follows the employee through a secured entrance to a room or building
grayware
when someone who is unauthorized follows the employee through a secured entrance to a room or building
keylogger
when someone who is unauthorized follows the employee through a secured entrance to a room or building
dictionary attack
when someone who is unauthorized follows the employee through a secured entrance to a room or building
social engineering
when someone who is unauthorized follows the employee through a secured entrance to a room or building
tailgating
when someone who is unauthorized follows the employee through a secured entrance to a room or building
Trojan
when someone who is unauthorized follows the employee through a secured entrance to a room or building
zombie
when someone who is unauthorized follows the employee through a secured entrance to a room or building
worm
A program that is potentially harmful or potentially unwanted
adware
A program that is potentially harmful or potentially unwanted
digital certificate
A program that is potentially harmful or potentially unwanted
grayware
A program that is potentially harmful or potentially unwanted
keylogger
A program that is potentially harmful or potentially unwanted
dictionary attack
A program that is potentially harmful or potentially unwanted
social engineering
A program that is potentially harmful or potentially unwanted
tailgating
A program that is potentially harmful or potentially unwanted
Trojan
A program that is potentially harmful or potentially unwanted
zombie
A program that is potentially harmful or potentially unwanted
worm
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
adware
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
digital certificate
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
grayware
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
keylogger
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
dictionary attack
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
social engineering
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
tailgating
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
Trojan
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
zombie
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
worm
an attack that can be used to crack a long password by trying words and word combinations
adware
an attack that can be used to crack a long password by trying words and word combinations
digital certificate
an attack that can be used to crack a long password by trying words and word combinations
grayware
an attack that can be used to crack a long password by trying words and word combinations
keylogger
an attack that can be used to crack a long password by trying words and word combinations
dictionary attack
an attack that can be used to crack a long password by trying words and word combinations
social engineering
an attack that can be used to crack a long password by trying words and word combinations
tailgating
an attack that can be used to crack a long password by trying words and word combinations
Trojan
an attack that can be used to crack a long password by trying words and word combinations
zombie
an attack that can be used to crack a long password by trying words and word combinations
worm
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
adware
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
digital certificate
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
grayware
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
keylogger
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
dictionary attack
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
social engineering
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
tailgating
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
Trojan
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
zombie
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
worm
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
adware
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
digital certificate
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
grayware
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
keylogger
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
dictionary attack
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
social engineering
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
tailgating
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Trojan
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
zombie
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
worm
type of spyware that tracks your keystrokes, including passwords
adware
type of spyware that tracks your keystrokes, including passwords
digital certificate
type of spyware that tracks your keystrokes, including passwords
grayware
type of spyware that tracks your keystrokes, including passwords
keylogger
type of spyware that tracks your keystrokes, including passwords
dictionary attack
type of spyware that tracks your keystrokes, including passwords
social engineering
type of spyware that tracks your keystrokes, including passwords
tailgating
type of spyware that tracks your keystrokes, including passwords
Trojan
type of spyware that tracks your keystrokes, including passwords
zombie
type of spyware that tracks your keystrokes, including passwords
worm
software installed on a computer that produces pop-up ads using your browser
adware
software installed on a computer that produces pop-up ads using your browser
digital certificate
software installed on a computer that produces pop-up ads using your browser
grayware
software installed on a computer that produces pop-up ads using your browser
keylogger
software installed on a computer that produces pop-up ads using your browser
dictionary attack
software installed on a computer that produces pop-up ads using your browser
social engineering
software installed on a computer that produces pop-up ads using your browser
tailgating
software installed on a computer that produces pop-up ads using your browser
Trojan
software installed on a computer that produces pop-up ads using your browser
zombie
software installed on a computer that produces pop-up ads using your browser
worm
Question
What are the risks in using BitLocker to secure your system and how can you mitigate these risks?
Question
What is a Trojan, and how is it installed?
Question
If you wish to monitor logon failures, what should you do?
Question
A person that secretly peaks at your monitor screen while you work may be doing what?

A) tailgating
B) screen capping
C) shoulder surfing
D) social engineering
Question
Describe Windows Firewall.
Question
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?

A) copyright
B) license
C) user agreement
D) cease and desist order
Question
Using a PIN or password in addition to TPM is an example of what type of authentication?

A) multifactor
B) biometric
C) asymmetric
D) symmetric
Question
What is a rootkit and why is it so difficult to detect?
Question
With respect to the default users and password settings, how can you use Group Policy to make your system more secure?
Question
Under what circumstances can a blank password be more secure than a non-blank password?
Question
Describe file and folder encryption in Windows (not how you encrypt a file).
Question
CryptoLocker is an example of what type of malware?

A) zero-day attack
B) worm
C) ransomware
D) man-in-the-middle
Question
Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.
Question
List five of the different criteria that make up a secure password?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/36
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Security Strategies
1
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?

A) rootkit
B) zombie
C) brute-force
D) man-in-the-middle
D
2
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

A) Trojan horse
B) rootkit
C) adware
D) worm
B
3
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

A) Windows POP technology
B) the BIOS
C) a feature available on some DVD drives
D) your USB keyboard
B
4
What command can be used to take full access of a file?

A) takeown
B) attrib
C) perms
D) icacls
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
5
What statement is true regarding the Guest account in Windows 7?

A) it is disabled by default
B) it automatically has a complex password
C) you cannot rename it
D) it has administrative access
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
6
What does the presence of the Cydia app on an iOS device indicate?

A) A rootkit has been installed on the device
B) The device is infected with a worm
C) The device has been jailbroken
D) There is spyware software installed on the device
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
7
What statement regarding passwords on Windows is accurate?

A) it's best to write your password down so you don't get locked out of your computer
B) passwords cannot be longer than 14 characters
C) by default, accounts with a blank password cannot logon remotely
D) letters and numbers are allowed, but no symbols such as '@' or '!'
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
8
When using the Windows Encrypted File System, what statement is accurate?

A) files can be marked for encryption, but not folders
B) an encrypted file moved to an unencrypted folder remains encrypted
C) EFS only works on NTFS and FAT32
D) you need to download special software to use EFS
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
9
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

A) ATA Secure Erase
B) low-level format
C) degausser
D) magnetic data filter
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
10
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
11
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

A) shoulder surfing
B) tailgating
C) social engineering
D) session hijacking
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
12
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

A) retinal scanner
B) LoJack token
C) smart card
D) TPM
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
13
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
14
What keystroke should you press to get a logon window if you don't use the welcome screen?

A) Alt+F1
B) Ctrl+Ins+Home
C) Alt+F5+End
D) Ctrl+Alt+Delete
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
15
Using Group Policy, you can set security policies to help secure a workstation.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
16
A root certificate is the original certificate issued by the CA.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
17
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

A) a USB port
B) an authentication key on the hard drive
C) a TPM chip on the motherboard
D) a PIN on the BIOS
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
18
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?

A) rootkits
B) malware signatures
C) static updates
D) Windows updates
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
19
What technology can be used to locate a device such as a laptop after it has been stolen?

A) Management software
B) LoJack
C) Trojan
D) Multifactor Trace software
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
20
On a peer-to-peer network, authentication is the responsibility of the domain.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
21
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term?

A) evidence security roster
B) chain of custody
C) item inventory
D) evidence tracking list
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
a code used to identify and authenticate a person or organization sending data over a network
adware
a code used to identify and authenticate a person or organization sending data over a network
digital certificate
a code used to identify and authenticate a person or organization sending data over a network
grayware
a code used to identify and authenticate a person or organization sending data over a network
keylogger
a code used to identify and authenticate a person or organization sending data over a network
dictionary attack
a code used to identify and authenticate a person or organization sending data over a network
social engineering
a code used to identify and authenticate a person or organization sending data over a network
tailgating
a code used to identify and authenticate a person or organization sending data over a network
Trojan
a code used to identify and authenticate a person or organization sending data over a network
zombie
a code used to identify and authenticate a person or organization sending data over a network
worm
A type of malware that tricks you into opening it by substituting itself for a legitimate program
adware
A type of malware that tricks you into opening it by substituting itself for a legitimate program
digital certificate
A type of malware that tricks you into opening it by substituting itself for a legitimate program
grayware
A type of malware that tricks you into opening it by substituting itself for a legitimate program
keylogger
A type of malware that tricks you into opening it by substituting itself for a legitimate program
dictionary attack
A type of malware that tricks you into opening it by substituting itself for a legitimate program
social engineering
A type of malware that tricks you into opening it by substituting itself for a legitimate program
tailgating
A type of malware that tricks you into opening it by substituting itself for a legitimate program
Trojan
A type of malware that tricks you into opening it by substituting itself for a legitimate program
zombie
A type of malware that tricks you into opening it by substituting itself for a legitimate program
worm
when someone who is unauthorized follows the employee through a secured entrance to a room or building
adware
when someone who is unauthorized follows the employee through a secured entrance to a room or building
digital certificate
when someone who is unauthorized follows the employee through a secured entrance to a room or building
grayware
when someone who is unauthorized follows the employee through a secured entrance to a room or building
keylogger
when someone who is unauthorized follows the employee through a secured entrance to a room or building
dictionary attack
when someone who is unauthorized follows the employee through a secured entrance to a room or building
social engineering
when someone who is unauthorized follows the employee through a secured entrance to a room or building
tailgating
when someone who is unauthorized follows the employee through a secured entrance to a room or building
Trojan
when someone who is unauthorized follows the employee through a secured entrance to a room or building
zombie
when someone who is unauthorized follows the employee through a secured entrance to a room or building
worm
A program that is potentially harmful or potentially unwanted
adware
A program that is potentially harmful or potentially unwanted
digital certificate
A program that is potentially harmful or potentially unwanted
grayware
A program that is potentially harmful or potentially unwanted
keylogger
A program that is potentially harmful or potentially unwanted
dictionary attack
A program that is potentially harmful or potentially unwanted
social engineering
A program that is potentially harmful or potentially unwanted
tailgating
A program that is potentially harmful or potentially unwanted
Trojan
A program that is potentially harmful or potentially unwanted
zombie
A program that is potentially harmful or potentially unwanted
worm
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
adware
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
digital certificate
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
grayware
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
keylogger
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
dictionary attack
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
social engineering
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
tailgating
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
Trojan
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
zombie
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
worm
an attack that can be used to crack a long password by trying words and word combinations
adware
an attack that can be used to crack a long password by trying words and word combinations
digital certificate
an attack that can be used to crack a long password by trying words and word combinations
grayware
an attack that can be used to crack a long password by trying words and word combinations
keylogger
an attack that can be used to crack a long password by trying words and word combinations
dictionary attack
an attack that can be used to crack a long password by trying words and word combinations
social engineering
an attack that can be used to crack a long password by trying words and word combinations
tailgating
an attack that can be used to crack a long password by trying words and word combinations
Trojan
an attack that can be used to crack a long password by trying words and word combinations
zombie
an attack that can be used to crack a long password by trying words and word combinations
worm
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
adware
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
digital certificate
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
grayware
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
keylogger
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
dictionary attack
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
social engineering
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
tailgating
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
Trojan
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
zombie
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
worm
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
adware
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
digital certificate
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
grayware
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
keylogger
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
dictionary attack
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
social engineering
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
tailgating
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Trojan
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
zombie
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
worm
type of spyware that tracks your keystrokes, including passwords
adware
type of spyware that tracks your keystrokes, including passwords
digital certificate
type of spyware that tracks your keystrokes, including passwords
grayware
type of spyware that tracks your keystrokes, including passwords
keylogger
type of spyware that tracks your keystrokes, including passwords
dictionary attack
type of spyware that tracks your keystrokes, including passwords
social engineering
type of spyware that tracks your keystrokes, including passwords
tailgating
type of spyware that tracks your keystrokes, including passwords
Trojan
type of spyware that tracks your keystrokes, including passwords
zombie
type of spyware that tracks your keystrokes, including passwords
worm
software installed on a computer that produces pop-up ads using your browser
adware
software installed on a computer that produces pop-up ads using your browser
digital certificate
software installed on a computer that produces pop-up ads using your browser
grayware
software installed on a computer that produces pop-up ads using your browser
keylogger
software installed on a computer that produces pop-up ads using your browser
dictionary attack
software installed on a computer that produces pop-up ads using your browser
social engineering
software installed on a computer that produces pop-up ads using your browser
tailgating
software installed on a computer that produces pop-up ads using your browser
Trojan
software installed on a computer that produces pop-up ads using your browser
zombie
software installed on a computer that produces pop-up ads using your browser
worm
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
23
What are the risks in using BitLocker to secure your system and how can you mitigate these risks?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
24
What is a Trojan, and how is it installed?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
25
If you wish to monitor logon failures, what should you do?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
26
A person that secretly peaks at your monitor screen while you work may be doing what?

A) tailgating
B) screen capping
C) shoulder surfing
D) social engineering
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
27
Describe Windows Firewall.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
28
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?

A) copyright
B) license
C) user agreement
D) cease and desist order
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
29
Using a PIN or password in addition to TPM is an example of what type of authentication?

A) multifactor
B) biometric
C) asymmetric
D) symmetric
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
30
What is a rootkit and why is it so difficult to detect?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
31
With respect to the default users and password settings, how can you use Group Policy to make your system more secure?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
32
Under what circumstances can a blank password be more secure than a non-blank password?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
33
Describe file and folder encryption in Windows (not how you encrypt a file).
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
34
CryptoLocker is an example of what type of malware?

A) zero-day attack
B) worm
C) ransomware
D) man-in-the-middle
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
35
Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
36
List five of the different criteria that make up a secure password?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 36 flashcards in this deck.