Lesson 6 - Chapter 2: Configuring Web Browser Settings Flashcards

1
Q

You should only download and install apps from trusted sources such as…?

A

the manufacturer’s website or well-known app stores (Apple App, Microsoft Store, Ninite, Softpedia)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s one of the most commonly used methods of verifying a download can be trusted?

A

Run a checksum or hashing total on the file

(a hash total is available from the trusted source most often)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you use a hashing total?

A

You compare the string available from the trusted source (MD5 or SHA256) to a hashing total generated on the downloaded file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On a Windows system, the PowerShell command _____ will generate a hash total for comparison with the hash value provided by the trusted source.

A

Get-FileHash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

According to Microsoft, what is an untrusted source?

A

any source that is not from the Microsoft store or sites Microsoft has listed as trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to Android, what is an unknown source?

A

apps or content not obtained from Google Play

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to Android, what are unknown developers?

A

Files not from the App store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Browser extensions are also called what?

A

Plug-ins, add-ons

(all mean the same thing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a browser extension/add-on?

A

a feature enhancement for the browser or enables an existing feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a plug-in?

A

It can provide support for certain tasks like viewing videos, opening PDF files, working with spreadsheets, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s a word of caution when it comes to extensions and plug-ins?

A

there are malicious ones, and can be very difficult to remove once installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the difference between a browser extension and a browser plug-in?

A

an extension runs outside of the browser to which it’s attached, a browser plug-in runs inside the browser

(Browser extension adds features or enhancements to features and plug-ins add support for certain tasks or features)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s a trusted source where you could install extensions and plug-ins?

A

application store of each OS provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What password managers are available for Win 10/11 and macOS?

A

Win10/Win11: Credential Manager in the Control Panel
macOS: Keychain (web and OS credentials)

(apart from the browser password managers available)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a secure connection?

A

encrypts network traffic before it is transmitted over a communication medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of secure connections do web browsers provide for the requests it sends to web servers over an HTTPS link?

A

they apply SSL or TLS encryption for the requests to web servers

17
Q

SSL/TLS provide what 3 layers of encryption for the web page transmitted back to the user?

A
  1. Encryption
  2. Authentication
  3. Integrity
18
Q

What does encryption mean?

A

it keeps the data private

19
Q

What does authentication mean?

A

ensures the data is from the same site the user requested it from

20
Q

What does integrity mean?

A

ensures the data isn’t altered in transit

21
Q

What’s another way besides SSL/TLS encryption to validate that a site is real/not a fake?

A

with a security certificate

22
Q

Why is a security certificate another way to be secure?

A

the certificate itself can be verified (which validates and authenticates a site’s ownership and its domain name)

23
Q

How do you view the security certificate for a website?

A

click the padlock icon on a browser’s address bar

24
Q

What is a pop-up?

A

Generally a nuisance, an object that displays over the top of a web page (may or may not be associated with the page)

(some legit sites require pop-ups for the site to function)

25
Q

Virtually all browsers have a setting for blocking….?

A

pop-ups

(in the privacy settings)

26
Q

A browser saves what 2 types of data?

A
  1. caching data
  2. browsing data
27
Q

What is caching data?

A

data that produces a website’s image

(browser stores the data to reproduce the page so it doesn’t have to re-download the data again from the source server)

28
Q

What is browsing data?

A

browser history, a historical record of the sites you’ve visited and downloaded during a period of time

(titles, URLs, time and date of the visit, data provided)

29
Q

What does the Private Browsing Mode do?

A

It doesn’t record the user’s online activities or cache downloaded files

30
Q

What don’t private browsers mask?

A

the identity of the user and in some cases like on a smartphone, records a small amount of browsing history

31
Q

What is Sign-in/Browser data synchronization?

A

user coordinates browser software and settings between devices (like Firefox tabs open on PC and on phone)

Any action is duplicated on the other after both devices are synchronized

32
Q

How do ad blockers work?

A

they remove coding from the downloaded web page file that would display the ad