IT APPLICATIONS 8: MANAGING SECURITY SETTINGS Flashcards

1
Q

Which browser is based on the same code as Chrome?

A

Microsoft Edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What will the administrator need to do to ensure the web page shows up as secure?

A

Add trusted certficates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Firefox user wants to open up their browser settings to configure their intranet as the home page. How can the Firefox user access the settings?

A

about:preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

They also notice the machines lack many patches. If malware infects the servers, what is the likely cause of the high CPU utilization?

A

Cryptomining software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

After verifying there are symptoms of malware, what is the next step the operator should take?

A

Quarantine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After conducting several analyses, the analyst learns the malware used Windows PowerShell to create new malicious processes in the computer’s memory. What is the analyst’s computer likely infected with?

A

Fileless malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The threat actor must establish a connection from the compromised host to a command and control host or network

A

C2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A developer wants to create functionality for a web browser by making API calls on the back end. What should the developer build?

A

Extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security manager in charge of the vulnerability program for the enterprise is looking at mobile security. They are reading about a “walled garden” approach. What does this entail?

A

Trusted Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly