Ch.4 Flashcards

(30 cards)

1
Q

What happens when Windows Defender is turned on?

A

You are notified when spyware or other potentially unwanted software tries to install itself or run on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What native antispyware feature is included with Windows?

A

Windows Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of software can assist you in protecting your computer against virus-related problems?

A

antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which software gathers the user’s information through the user’s Internet connection without the user’s knowledge?

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which software damages or disrupts a system without the owner’s permissions?

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In which specific area of a hard disk drive does a boot-sector virus place its starting code?

A

Master Boot Record (MBR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a virus?

A

malicious software (malware) that relies upon other application programs to execute and infect a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of attack is conducted by an e-mail request from a financial institution asking you to log in and change your password using the provided link?

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is dumpster diving?

A

searching the garbage collection area or dustbin to look for non-shredded confidential documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is war chalking?

A

leaving notations about the wireless network on the outside of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is shoulder surfing?

A

watching someone when he enters his login credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is tailgating?

A

the act of gaining unauthorized access to a facility by using another user’s access credentials without the permission of the authorized person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When does a zero-day attack occur?

A

When live environments become vulnerable and targeted before a fix or patch can be created by the vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a man-in-the-middle attack?

A

When a hacker is positioned on both sides of the attack to intercept communication between two sessions and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the FIRST action you should perform if you find that your fellow technician has left the door of the server room open?

A

Close the door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which guidelines should you refer to if you find that someone has breached the security of the server room?

A

the company’s security policy

17
Q

What is a smart card?

A

It is an authentication card with an integrated circuit built in.

18
Q

What does a face recognition scanner do?

A

It determines whether to authenticate a user by scanning the user’s face and comparing that scan to face scans already on file.

19
Q

What does an iris scanner do?

A

It determines whether to authenticate a user by taking a picture of the iris of the user’s eye and comparing the picture with iris pictures on file.

20
Q

Which physical barrier acts as the first line of defense against an intruder?

21
Q

What is a mantrap?

A

a set of double doors that are generally monitored by a security guard

22
Q

Which authentication method uses fingerprint recognition as a method to identify an individual?

A

biometric authentication

23
Q

Which authentication method uses a small card with an embedded silicon chip which stores information on it?

A

smart card authentication

24
Q

What should you do if your smart card is stolen?

A

Get it inactivated and replaced.

25
Which device can be installed to monitor visitor entry in server room when there is not enough manpower to escort the visitor?
video surveillance cameras or closed-circuit television (CCTV)
26
Which attributes or details of an employee can be used by biometric devices?
fingerprint, face, signature, iris, and retina
27
What does the acronym ACL denote?
access control list
28
What does the acronym VPN denote?
virtual private network
29
What is a digital certificate?
an electronic file that establishes your identity via a public key infrastructure (PKI) to complete transactions
30
Which three types of characters can be used in combination to set a strong password in Windows?
alphabetic, numeric, and special characters