Deck 29: Securing Computers
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/89
Play
Full screen (f)
Deck 29: Securing Computers
1
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?
A) Spyware
B) Trojan
C) Virus
D) Worm
A) Spyware
B) Trojan
C) Virus
D) Worm
C
2
What is a software program that looks like one thing (such as a utility or a game)but is actually doing something else (such as modifying CMOS settings)?
A) Spyware
B) Trojan
C) Virus
D) Worm
A) Spyware
B) Trojan
C) Virus
D) Worm
B
3
What is it called when a user accesses resources in an unauthorized way?
A) Authorized access
B) Normal
C) Unauthorized access
D) Virus attack
A) Authorized access
B) Normal
C) Unauthorized access
D) Virus attack
C
4
Antimalware programs can passively monitor your computer's activity.In this mode,what are they called?
A) Grayware
B) Spyware
C) Virus shields
D) Virus swords
A) Grayware
B) Spyware
C) Virus shields
D) Virus swords
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
5
What could a computer use to determine a user's identity with the most authority?
A) Biometric device
B) Password
C) User name
D) Firewall
A) Biometric device
B) Password
C) User name
D) Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
6
How does a computer determine who can or should access it?
A) Access control
B) Authentication
C) Encryption
D) Secure servers
A) Access control
B) Authentication
C) Encryption
D) Secure servers
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
7
What is it called when a hacker goes through the garbage looking for information?
A) Dumpster diving
B) Infiltration
C) Garbage scan
D) Wastebasket diving
A) Dumpster diving
B) Infiltration
C) Garbage scan
D) Wastebasket diving
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
8
A user has a credit card-sized card used to prove her identity with a PIN.What is this card called?
A) Authorization card
B) Biometric card
C) Smart card
D) Task card
A) Authorization card
B) Biometric card
C) Smart card
D) Task card
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
9
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?
A) Spyware
B) Trojan
C) Virus
D) Worm
A) Spyware
B) Trojan
C) Virus
D) Worm
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
10
To lock down security settings on a single computer in a workgroup,what would you use?
A) Group Policy
B) Local Security Settings
C) Account Lockout Policy
D) Password Policy
A) Group Policy
B) Local Security Settings
C) Account Lockout Policy
D) Password Policy
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
11
What is the process of using or manipulating people inside the networking environment to gain access to that network from the outside?
A) Internal virus
B) Inside attack
C) Hacking
D) Social engineering
A) Internal virus
B) Inside attack
C) Hacking
D) Social engineering
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
12
What is Microsoft's encryption method of choice for providing transparent encryption between the server and the client?
A) IPSec
B) HTTPS
C) Digital certificate
D) PAP
A) IPSec
B) HTTPS
C) Digital certificate
D) PAP
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not considered grayware?
A) Pop-ups
B) Spyware
C) Adware
D) Phishing
A) Pop-ups
B) Spyware
C) Adware
D) Phishing
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
14
Most computer attacks are accomplished through what type of attack?
A) Port scanning
B) Social engineering
C) Buffer overflows
D) Password cracking
A) Port scanning
B) Social engineering
C) Buffer overflows
D) Password cracking
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
15
Sally is a member of multiple groups.A file has been granted different permissions to the different groups.What is Sally's effective permission?
A) Combined permissions of all groups
B) Full Control
C) Most restrictive permissions of all groups
D) Impossible to say
A) Combined permissions of all groups
B) Full Control
C) Most restrictive permissions of all groups
D) Impossible to say
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
16
What is the act of trying to get people to give their user names,passwords,or other security information by pretending to be someone else electronically called?
A) Phishing
B) Dumpster diving
C) Phunting
D) Compliance
A) Phishing
B) Dumpster diving
C) Phunting
D) Compliance
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
17
To lock down security settings on a single computer in a domain,what would you use?
A) Group Policy
B) Local Security Settings
C) Account Lockout Policy
D) Password Policy
A) Group Policy
B) Local Security Settings
C) Account Lockout Policy
D) Password Policy
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
18
Together,what are viruses,Trojans,and worms called?
A) Grayware
B) Helpful software
C) Malware
D) Spyware
A) Grayware
B) Helpful software
C) Malware
D) Spyware
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
19
Physical security,authentication,the file system,users and groups,and security policies combine to make what?
A) Access control
B) Authentication
C) Encryption
D) Secure servers
A) Access control
B) Authentication
C) Encryption
D) Secure servers
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
20
What word describes the process of cleaning up after a virus infection?
A) Remnants
B) Remediation
C) Quarantine
D) Declassification
A) Remnants
B) Remediation
C) Quarantine
D) Declassification
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
21
What type of program isn't destructive by itself,but leaches bandwidth in networks?
A) Adware
B) Grayware
C) Pop-ups
D) Spyware
A) Adware
B) Grayware
C) Pop-ups
D) Spyware
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
22
What is the correct humidity range for computer equipment?
A) 0-20 percent
B) 10-20 percent
C) 30-40 percent
D) 60-80 percent
A) 0-20 percent
B) 10-20 percent
C) 30-40 percent
D) 60-80 percent
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
23
What is simply observing someone's screen or keyboard to get information,often passwords?
A) Shoulder surfing
B) Tailgating
C) Dumpster diving
D) Phishing
A) Shoulder surfing
B) Tailgating
C) Dumpster diving
D) Phishing
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
24
The tool used to apply policy settings to multiple computers in an Active Directory domain is ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
25
Sally is a member of the Sales group and the Marketing group.The Marketing group has Full Control permission to a folder named NewProducts,and the Sales group has Read permission to the same folder.Sally's permission to the folder is ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
26
A program that looks useful,such as a game or a utility,but is actually maliciously doing something else to the system is known as a (n)____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
27
Which current authentication method is typically used over a LAN?
A) CHAP
B) Kerberos
C) MS-CHAP
D) PAP
A) CHAP
B) Kerberos
C) MS-CHAP
D) PAP
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
28
To make sure antivirus programs are as useful as possible,what should be updated regularly?
A) Browser
B) Security updates
C) Signatures
D) Windows updates
A) Browser
B) Security updates
C) Signatures
D) Windows updates
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
29
Malicious software is also known as ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
30
Following someone through the door is an example of ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
31
A (n)____________________ is signed by a trusted authority that guarantees that the public key you are about to get is actually from the Web server and not from some evil person trying to pretend to be the Web server.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
32
The tool used to set local policies on an individual system is ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
33
A device that can prove who you are based on your fingerprint is known as a(n)____________________ device.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
34
What can be used to create entries in the Security log whenever a user logs on?
A) Event auditing
B) Object access auditing
C) Event tracking
D) Success logging
A) Event auditing
B) Object access auditing
C) Event tracking
D) Success logging
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
35
All of the following are characteristics of employee ID badges EXCEPT:
A) Even relatively small organizations use them.
B) They control building access.
C) They store authentication information.
D) They are used to store encryption keys.
A) Even relatively small organizations use them.
B) They control building access.
C) They store authentication information.
D) They are used to store encryption keys.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
36
A common ____________________ attack is where an attacker uses the telephone and convinces a user to give up secure information.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
37
What type of virus attempts to change its signature to prevent detection by antivirus programs?
A) Grayware
B) Spyware
C) Polymorph
D) Stealth
A) Grayware
B) Spyware
C) Polymorph
D) Stealth
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
38
Not all __________ access is malicious,but it should still be prevented;for example,a user may poke around a network share and see sensitive information.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
39
What type of program runs in the background on your PC,sending information about your browsing habits to the company that installed it on your system?
A) Adware
B) Grayware
C) Pop-ups
D) Spyware
A) Adware
B) Grayware
C) Pop-ups
D) Spyware
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
40
All of the following are considered environmental controls EXCEPT:
A) Air conditioning
B) Temperature controls
C) Humidity controls
D) Closed circuit cameras
A) Air conditioning
B) Temperature controls
C) Humidity controls
D) Closed circuit cameras
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
41
A (n)____________________ is a device or software (or combination of both)used to protect an internal network from unauthorized access from the Internet.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
42
A complete program that travels from machine to machine through computer networks and can cause so much activity that it can overload a network is a (n)____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
43
Unsolicited e-mail is more commonly known as ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
44
Windows XP and later come with an excellent software firewall,called the ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
45
To detect executable viruses,an antivirus program uses a library of ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
46
You are tasked with ensuring that any time a file or folder is accessed,details of the access are logged.This is an example of ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
47
A (n)__________ is something the user has,like an ID card or security token.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
48
A (n)__________ (also called a biometric)is something that is part of the user,like a fingerprint or retinal pattern.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
49
The authentication encryption used in Windows network operating systems is ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
50
The security protocol that works with HTTP to create secure Web sites is ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
51
The list of viruses your antivirus program can recognize is called the ____________________ file.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
52
Boot sector viruses that use various methods to hide from antivirus software are known as ____________________ viruses.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
53
Microsoft's encryption method of choice over private connections such as ISDN or T1 is ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
54
When the screen lock feature is enabled,a user won't be able to return to the desktop until they've entered the ___________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
55
Access control is the process of implementing methods to ensure unauthorized users can't access your system.Two primary methods are physical security and ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
56
__________ reduce the viewing angle,making it impossible for anyone to read the screen except those directly in front of it.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
57
The scrambling code used to attempt to modify a (n)____________________ virus to prevent detection is actually used as the signature to detect the virus.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
58
Surprise browser windows that appear automatically when you visit a Web site are ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
59
When configured to do so,Windows will create an entry in the Security Log when someone tries to access a certain file or folder-this is called __________ auditing
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
60
A __________ is something the user knows,like a password or personal identification number (PIN).
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
61
What is a stealth virus?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
62
What tool is used to set security policies on an individual system?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
63
What is a common LAN authentication protocol used today?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
64
Where can you find Event Viewer?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
65
What command line utility can you use to go from FAT32 to NTFS?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
66
You identify a server that is using FAT32 as the file system.You decide to change it to an NTFS drive.What command would you enter at the command line?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
67
Describe a smart card.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
68
What is the difference between a virus and a worm?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
69
Define social engineering.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
70
Define malware.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
71
What is a polymorph virus?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
72
What is a Trojan horse?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
73
What can be used to set security policies for users or computers in a domain?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
74
List five ways to increase security protection for a wireless network.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
75
What are the benefits of incidence reporting?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
76
List the four interlinked topics that should be considered when implementing access control.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
77
Define effective permissions.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
78
Define antivirus signature.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
79
What is spyware?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
80
What are two important things to do to protect systems from a worm?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck