Securing Devices and Data Flashcards

1
Q

Allows encryption of individual drives and folders on any NTFS volume. It is included with Business/Professional/Enterprise/Ultimate editions of Windows, as well as all editions of Windows Server

A

EFS: Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encrypts entire NTFS volumes, including the system drive. It is available on Enterprise and Ultimate Editions of Windows Vista and 7, Pro and Enterprise versions of Windows 8 and later, and all editions of Windows Server 2008 and later.

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Used to protect removable drives, such as USB flash drives. It can encrypt drives formatted as FAT16, FAT32, and exFAT as well as NTFS. It is included in Windows 7 and later systems which include BitLocker

A

BitLocker-To-Go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three ways BitLocker can authenticate:

A

Transparent operation mode
User authentication mode
USB key mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allows the user to start up the computer and log into Windows as normal

A

Transparent operation mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Prompts the user for a PIN or password on startup

A

User authentication mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stores a startup key on a USB device

A

USB key mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use powerful electromagnets to destroy all data on magnetic media like tapes and hard drives, but not optical or flash storage

A

Degaussers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To securely delete files on an active computer, install a secure deletion program such as:

A

SDlelete, CCleaner, Eraser, and File Shredder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Writes zeroes to the entire drive and restores it to its newly installed configuration

A

low-level format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data destruction utilities

A

DBAN, HDShredder, and KillDisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An entire volume encryption feature included with Windows Vista and Windows 7 Ultimate and Enterprise editions; uses a Trusted Platform Module (TPM) microchip; can encrypt the NTFS volumes including the system volume; requires a smaller boot volume with at least 100 MB of free space in order to perform the decryption routines; and is compatible with EFS

A

Bitlocker Drive Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of security software used by an IT department to monitor, manage, and secure employees’ mobile devices.

A

Mobile device management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Policy governs a user-owned device on the corporate network

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Swing a finger across the screen, or a certain part of the screen, to unlock.

A

Swipe Screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unlock the device with a numeric PIN.

A

Passcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unlock the device by drawing a predefined structure over points on the screen.

A

Pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A strong authentication term of identification which includes mixed cases and special characters.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A camera with infrared (IR) sensitivity is effective for unlocking the device under varying light conditions.

20
Q

Used to force stop an app from within the operating system, or uninstall and reinstall it

A

App control features

21
Q

Used to verify signal problems and check the signal strength or connection speed problems

A

Wireless analyzer

22
Q

Used to monitor the system or actively scan for signs of malware

A

Antimalware

23
Q

Used to rearrange the device to a freshly installed state, deleting user data, installed apps, and, any installed malware

A

Factory resets

24
Q

Used to notice unusual activities in the device even if they’re not strictly malware

A

App scanner

25
Layers of defense in depth strategies
``` Physical Facility Internal Network Host Application Data ```
26
Signs of Maleware
File alteration, Unfamiliar programs, Security alerts, Log errors, Browser oddities, Email issues, Stability and performance, Failed updates
27
Malware removal tools
``` Antivirus scanner Antimalware software Event Viewer System Restore System backups Terminal MSCONFIG Installation media Recovery environment Rescue disk ```
28
Mobile troubleshooting tools
``` Antimalware App scanner Wireless analyzer App control features Backup and restore Factory resets ```
29
Steps in removing Malware
1. Identify 2. Quarantine the system 3. Disable system restore 4. Repair the system (anti-malware software) 5. Update system/schedule future scans 6. Enable system restore/create new restore point 7. Educate and document findings
30
Steps to Quarantine a system
1. Isolate removable storage (should be scanned) 2. Disable all networking and sharing properties 3. Identify other computers for infection 4. Limit network connectivity
31
Disable System Restore
Win 10: System > System Protection > System Properties > (select drive) > Configure > Disable System Protection > (click ok)
32
Used to detect and diagnose unusual system behavior.
Event Viewer
33
Used to save and reinstate system files and settings
System Restore
34
Used when system files are missing or damaged
Installation media
35
Used when the computer won't boot
Recovery environment
36
Used to change boot options
MSCONFIG
37
In iOS, which feature is responsible for locating and remotely wiping lost devices?
the Find My iPhone feature in iCloud
38
What are the three recycling or repurposing methods listed on the A+ exam guide?
Low-level format vs. standard format Overwrite Drive wipe
39
Which three protocols provide encrypted communications between 802.11x wireless clients and wireless access points?
Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2
40
Why does WPA use Temporal Key Integrity Protocol (TKIP)?
to ensure that a new encryption key is provided for every packet that is sent
41
What does three-factor authentication use?
something you know (i.e. username or password), something you have (i.e., smart card), and something you are (i.e., biometric authentication)
42
Which wireless security protocol is most secure: WPA, WPA2, or WEP?
WPA2
43
A form of malicious software and Internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer).
Rogue antivirus
44
A decoy computer system which helps to trap hackers or track unconventional or new hacking methods.
Honeypot
45
A code that is intended to take full or partial control of a system at the lowest levels.
Rootkit
46
Provides strong authentication for client/server applications by using secret-key cryptography.
Kerberos
47
Steps to remove malware
1. Identify symptoms 2. Quarantine the infected systems 3. Disable system restore 4. Remediate infected system 5. Update/install anti-malware software 6. Scan and use removal techniques 7. Schedule scans and run update 8. Enable system restore and create a restore point 9. Educate the end-user