Module 9 - System and endpoint protection Flashcards
(137 cards)
Which person is responsible for configuring the OS to eliminate unnecessary services and apply timely security patches?
An administrator
Which approach involves establishing procedures for update monitoring, evaluation, planning, and documented installation?
A systematic approach
Which comparison method helps identify potential vulnerabilities by referencing expected performance norms?
Establishing a Baseline
Which security software warns the user upon detecting viruses and then either isolates or deletes them?
Antivirus
Which form of protection is designed to block programs that generate unwanted pop-up advertisements?
Adware protection
Which protection mechanism works by identifying and blocking the IP addresses of known phishing sites?
Phishing protection
Which security tool scans for keyloggers and similar threats that monitor user input for malicious purposes?
Spyware protection
Which feature alerts the user if a program or website is considered risky or comes from an unverified origin?
Trusted/Untrusted Source verification
Which instruction is important when using multiple antivirus or antimalware programs to avoid interference?
Only one program should be run at a time
Which method of attack involves impersonating legitimate websites to harvest user credentials?
Phishing
Which type of fake security software mimics a legitimate warning message to trick users into installing malware?
Rogue antivirus products
Which type of attack uses legitimate programs and memory-resident methods to avoid leaving any file traces?
A fileless attack
Which kind of malware attack ceases after a reboot because it never installs files on the system?
Fileless malware
Which scripting languages are mentioned as capable of creating malware in script form?
Python, VBA , Bash
Which macOS and Linux command-line language can be exploited to write script-based malware?
Bash
Which Microsoft macro language can be exploited to write malicious scripts embedded in documents?
VBA (Virtual Basic for Applications)
Which kind of software, although not necessarily malicious, should still be removed if unauthorized or non-compliant?
Unapproved software
Which kind of vulnerability can cybercriminals exploit if not addressed by code updates?
Weaknesses in unpatched systems
Which type of code update prevents viruses, worms, or malware from exploiting system flaws?
Patches
Which software package often combines patches and upgrades to secure a system?
Service Pack
Which type of solution runs directly on a local device and works with the operating system to prevent attacks?
A host based security solution
Which software runs on a device to filter incoming and outgoing network activity specifically for that device?
A host based firewall
Which firewall configuration option lets you define the kinds of traffic allowed into the system?
Inbound rules
Which tool monitors a host for system calls, file system access, and suspicious behavior?
HIDS (Host based Intrusion Detection System)