Configure Browser Security Flashcards

Lesson 17B (17 cards)

1
Q
A

Google Chrome web store provides an official location for publishing extensions and themes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

Sync settings in a Microsoft Edge browser profile. (

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

When the browser trusts the certificate issued to www.comptia.org, it displays a lock icon and identifies the URL as HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

Mozilla Firefox’s trusted certificate store showing the DigiCert root certificates that are trusted
authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A

Viewing cookies set by visiting comptia.org’s home page in Google’s Chrome browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data-at-rest encryption

A

protecting data that is stored on a device, like a hard drive or cloud server, by encoding it with a key, ensuring only authorized users with the key can access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encrypting File System (EFS)

A

is a feature in Microsoft Windows that allows users to encrypt files and folders on their computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BitLocker

A

It protects data by encrypting entire drives, ensuring that if a drive is lost or stolen - Windows Pro, Enterprise, and Education editions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

browsers

A

Microsoft Edge has replaced Internet Explorer, utilizing the Chromium codebase like Google Chrome, while other mainstream browsers like Firefox, Opera, and Safari remain widely used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

trusted browsers

A

Ensuring a browser is installed from a trusted source, such as an official app store or reputable vendor, helps prevent security risks, with integrity verification done via code-signing certificates or hash comparisons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

untrusted browsers

A

Installing browsers from untrusted sources risks exposure to adware, spyware, and redirection attacks, making verification through digital signatures or hash comparisons essential for software integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Browser add-ons

A

enhance functionality but can pose security risks. Extensions modify features and may run scripts, plug-ins display multimedia content but are now largely obsolete, apps facilitate cloud-based document editing, default search providers can redirect searches, and themes change appearance. Trusted sources should be used, as malicious extensions can bypass security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

browser settings

A

Browsers allow users to configure settings like home pages, tab behavior, and search engine choices via menu buttons or internal URLs (e.g., chrome://settings, edge://settings, about:preferences). Advanced settings can be accessed through URLs like chrome://flags or about:config.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

sign-in privilages

A

Signing into a browser enables synchronization of settings, bookmarks, history, autofill entries, and passwords across multiple devices for a seamless browsing experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password managers

A

help users create and store strong passwords across different services, preventing reuse that could lead to credential compromise. They autofill credentials and sync across devices, though some sites may not fully support them, requiring manual input as a fallback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password security

A

is crucial for workstation protection, with best practices including strong credential management and account policies. Weak passwords expose systems to cyberattacks through dictionary-based guessing or breached databases. Trusted certificates ensure secure authentication, with Windows updating root certificates via Active Directory, while third-party browsers require manual trust configuration for enterprise certificates.

17
Q

Browser privacy settings

A

control tracking tools like cookies, fingerprinting, and unwanted content through features such as pop-up blockers, ad blockers, and tracking protection. Clearing cache and browsing data or using private/incognito mode enhances privacy but does not ensure full anonymity, as sites can still track users via IP addresses and fingerprinting techniques.