6. Securing Devices and Data Flashcards

1
Q

Which feature in web browsers will prevent pop-ups from launching?

A

pop-up blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

According to the A+ exam guide, what are the steps in malware removal

A
  1. Identify and research malware symptoms
  2. Quarantine the infected systems
  3. Disable System Restore (in Windows)
  4. Remediate the infected systems
  5. Update the anti-malware software
  6. Scan and use removal techniques (safe mode, pre-installation environment)
  7. Schedule scans and run updates
  8. Enable System Restore and create a restore point (in Windows)
  9. Educate the end user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to the A+ exam guide, what is the first step in malware removal

A

Identify and research malware symptoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to the A+ exame guide, what is the last step in malware removal

A

Educate the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

After malware removal, why should you educate the end user?

A

to prevent future malware infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should you do if a user needs an administrative password to install a program on his computer?

A

Enter the password yourself and install the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why should you not store passwords in a text file on your desktop

A

Someone can open the file and read your passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a retinal scanner do

A

It uses a laser to scan the blood vessels in the back of the eye to authenticate a person’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the acronym NAC denote

A

network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In iOS, which feature is responsible for locating and remotely wiping lost devices?

A

the Find My iPhone feature in iCloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a locator application

A

An application that helps locate a mobile device when it is stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three recycling or repurposing methods listed on the A+ exam guide

A
  • Low-level format vs standard format
  • Overwrite
  • Drive wipe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should you configure when setting up a wireless connection?

A

Configure the SSID and decide which encryption standard to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you ensure that your SSID is not seen by computers in other offices?

A

Do not broadcast the SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What occurs when MAC filtering is enabled on a wireless access point

A

The MAC address of each network interface card (NIC) that attempts to connect to the network is checked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two default elements should you change to secure a newly configured wireless network from unauthorized access?

A

password and SSID

17
Q

What happens when MAC filtering is enabled on a wireless network

A

Only MAC addresses that specifically allowed connection are granted connection

18
Q

Which three protocols provide encrypted communications between 802.11x wireless clients and wireless access points

A
  • Wired Equivalent Privacy (WEP)
  • Wi-Fi Protected Access (WPA)
  • WPA2
19
Q

Why does WPA use Temporal Key Integrity Protocol (TKIP)

A

to ensure that a new encryption key is provided for every packet that is sent

20
Q

What does the acronym WPA denote

A

Wireless Protected Access

21
Q

What does the acronym WEP denote

A

Wired equivalent privacy

22
Q

What does three-factor authentication use

A
  1. Something you know (username, password)
  2. Something you have (smart card)
  3. and something you are (biometric authentication)
23
Q

Which wireless security protocol is more secure: WPA, WPA2, or WEP

A

WPA2

24
Q

BitLocker

A

An entire volume encryption feature included with Windows Vista and Windows 7 Ultimate and Enterprise editions, and Windows 8 and higher Professional and Enterprise editions

25
Q

BitLocker-To-Go

A

A BitLocker component used to protect removal drives, such as USB flash drives

26
Q

Degausser

A

A device which uses powerful electromagnets to destroy all data on magnetic media like tapes and hard drives, but not optical or flash storage

27
Q

Encrypting File System (EFS)

A

A file system which allows encryption of individual drives and folders on any NTFS volume

28
Q

Event Viewer

A

A tool used to detect and diagnose unusual system behavior

29
Q

Rescue Disk

A

A combination of antimalware and system repair tools on a bootable disc or flash drive

30
Q

Trusted Platform Module (TPM)

A

A microchip installed on the motherboard of desktop and portable computers, which stores critical encryption keys in hardware inaccessible to the operating system of most attackers

31
Q

TPM

A

Trusted Platform Module