Security Flashcards

1
Q

What is a smart card?

A

A hardware device that has an embedded microchip that contains authentication or security information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a digital signature?

A

An electronic signature that can be used to prove the sender’s identity or a document’s signer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a digital certificate?

A

An electronic file that establishes your identity via a public key infrastructure (PKI) to complete transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is chassis intrusion detection in the BIOS?

A

A physical intrusion detection system that alerts the user if the computer’s cover has been removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of attach is conducted by an email request from a financial institution asking you to log in and change your password using the provided link?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of attack uses drones to obtain email accounts to send spam?

A

A botnet attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the quickest way to lock a Windows 7 computer?

A

Win + L

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How should you protect a portable computer from being stolen in your absence if the portable computer cannot be physically secured using a locking mechanism?

A

Lock the portable computer in a drawer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should you do to ensure that an authorized user does not reveal security information or credentials to any unauthorized person?

A

Implement social engineering mitigation techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which guidelines should you refer to if you find that someone has breached the security of the server room?

A

The company’s security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the FIRST action you should perform if you find that your fellow technician has left the door of the server room open?

A

Close the door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which software gather’s the user’s information through the user’s internet connection without the user’s knowledge?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which recommended file system format for Windows XP enables advanced performance, security, and reliability features?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two ways that you can encrypt a file?

A
  • Right-click the file, select Properties, and click Advanced.
  • Use the Cipher command
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you enable some users to access certain files and restrict others from accessing the same files?

A

Set different permissions for the users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four primary user groups on a Windows XP computer?

A

Administrators, Power Users, Users, and Guests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which two passwords can be configured using the BIOS setup utility?

A

Supervisor password and user password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which password can be configured to prevent unauthorized access to the BIOS setup utility?

A

Supervisor password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which password prevents unauthorized users from booting up the computer?

A

User password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What should a technician do when facing an error ‘SSL certificates are no longer valid’?

A

Clear the SSL slate in Internet Explorer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which type of software can assist you in protecting your computer against virus-related problems?

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why should you not store passwords in a text file on your desktop?

A

Someone can open the file and read your passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In a Microsoft Active Directory domain, what must a user’s password contain by default?

A
A password must contain three out of the following four conventions:
• Upper-case letters
• Lower-case letters
• Numeric or special characters
• At least 8 characters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What should an administrator tell a user about passwords?

A

Memorize the password, and do not tell anyone the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the maximum length of the Windows password that is supported by Windows XP?
127 characters
26
What can you configure on a Microsoft Active Directory domain to ensure that all Windows XP and Vista users have passwords that adhere to the company security policy?
Group Policy object
27
What is the latest encryption standard that must be used to protect the data being transmitted over a wireless network?
Wi-Fi Protected Access, second generation (WPA2)
28
What are the three levels of encryption standards for wireless networks?
WEP, WPA, and WPA2
29
Which tool helps determine the security state of an organization?
Windows Baseline Security Analyzer
30
What should you do if you overhear a private conversation between two managers of a different department?
Keep the information confidential
31
Which security protocol is used to secure wireless local area networks (WLANs) defined in the IEEE 802.11 wireless networking standard?
Wired Equivalent Privacy (WEP)
32
What type of virus generally affects the system by attaching itself to MS-Office applications?
Macro virus
33
What type of virus can infect system files and boot sectors of a computer system?
Multipart and boot sector viruses
34
What does a polymorphic virus do?
Produces multiple operational copies of itself
35
What does a self-garbling virus do?
Formats its own code to prevent antivirus software from detecting it
36
What does a stealth virus do?
Hides the changes it makes as it replicates
37
What is a Trojan horse?
Malware that is disguised as a useful utility but embeds malicious code in itself
38
What is a virus?
Malicious software (malware) that relies upon other application programs to execute and infect a system
39
What uses tracking cookies to collect and report on a user's activities?
Spyware
40
Which attributes or details of an employee can be used by biometric devices?
``` They include: • Fingerprints • Face • Signature • Iris • Retina • Hand geometry ```
41
What are two common tools from Microsoft to fight malware?
Windows Defender and Microsoft AniSpyware
42
What is the purpose of BitLocker in Windows Vista?
Drive encryption
43
Which wireless security protocol is most secure: WPA, WPA2, or WEP?
WPA2
44
Which Windows feature can cause your system to be reinfected with a virus?
The System Restore feature
45
In biometrics, which security is worse: a false negative or a false positive?
False positive
46
In biometrics, what is a false positive?
When someone who is NOT supposed to have access to the system is erroneously granted access
47
In biometrics, what is a false negative?
When someone who is supposed to have access to the system is erroneously denied access
48
What is adware?
Software installed on your computer that automatically displays advertisements when the software is running
49
Which security device protects the local network from outside hacking by blocking ports and filtering MAC addresses?
A firewall
50
What is the number of characters in a 256-bit WEP key?
58
51
What is the number of characters in a 104-bit WEP key?
26
52
What is the number of characters in a 40-bit WEP key?
10
53
Which command is used to run the driver installation of wireless connection?
DEVMGMT.MSC
54
Which encryption key is used to provide security along with the service set identifier (SSID) to access a secure wireless network?
The Wired Equivalent Privacy (WEP) key
55
Where is the Security Center icon located in Windows XP?
In Control Panel
56
The Security Center icon in Windows XP was introduced with which Service Pack?
SP2
57
In which specific area of a hard disk drive does a boot-sector virus place its starting code?
Master Boot Record (MBR)
58
What should you do to effectively use your virus scanner to protect your computer from mail-, Wed-, and removable media-borne viruses?
Configure the virus scanner to scan email, web pages, and removable media as well as your hard drive
59
What type of attack takes the control of a session between a server and a client?
Session hijacking
60
Which device can be installed to monitor visitor entry into a server room when there is not enough manpower to escort the visitor?
Video surveillance cameras or closed-circuit television (CCTV)
61
Which type of cards use a public key infrastructure (PKI) for secure access?
Smart cards
62
Which mode of communication does Bluetooth wireless technology use?
Radio waves
63
Which three types of characters can be used in combination to set a strong password in Windows XP?
Alphabetic, numeric, and special characters
64
Which wizard is used to setup a wireless connection in Windows XP?
Wireless Network Setup Wizard
65
Which tab on the Wireless Connection Properties dialog box of Windows XP SP1 or SP2 should be used to specify the name of the server to be used for authentication?
The Authentication tab
66
What should you do if your smart card is stolen?
Get it inactivated and replaced
67
Which authentication method uses a small card with an embedded silicon chip which stores information on it?
Smart card authentication
68
Which authentication method uses fingerprint recognition as a method to identify an individual?
Biometric authentication
69
Which authentication method can be used to identify a person on the basis of that person's physiological or behavioral characteristics?
Biometric authentication
70
Which option should be selected in Control Panel > Administrative Tools to create a new local group?
Computer Management
71
Which tab under the User Accounts option in Control Panel will you use to ensure that a user must press the Ctrl+Alt+Del keys before logging in?
The Advanced tab
72
If a drive or a partition is converted from FAT32 to NTFS, which step needs to be performed to convert it back to FAT32 in Windows XP?
Format the drive or partition
73
What should you do to notify a user before deleting a shared folder from a network computer?
Send a Console Message by navigating to Computer > Management > Shared Folders > Shares > All tasks > Send Console Message
74
Which step should be performed first while deleting a shared folder from a network computer?
Notify all users by sending a console message
75
Which three permissions are given to a user by default when a folder is shared on a Windows XP computer?
Read and Execute, List Folder Contents, and Read permissions
76
What is the recommended process when you need to assign a group of permissions to a set of users?
Create a group. Assign the permissions to the group. Add all the user accounts to the group.
77
Why should you disable all unused features of your Web browser?
To provide the best security for your web browser
78
What is the term for creating TCP/IP packets using somebody else's IP address?
IP spoofing
79
Where on a Windows XP computer can you find information about the user accounts that previously logged into the computer?
Security Log in Event Viewer
80
Which type of attack attempts to disrupt access to the server, which is forced to re-authenticate on each web page?
Distributed denial-of-service (DDoS)
81
On which protocol does an attacker attack by taking advantage of the security flaws during network implementation to carry out land attacks?
Transmission Control Protocol/Internet Protocol (TCP/IP)
82
Which five main attack vectors are used by social engineering hackers?
Online, telephone, waste management, personal approaches, and reverse social engineering
83
What is the name of the technique of circumventing technological security measures by manipulating people to disclose secure information?
Social engineering
84
What must you consider when calculating the effective permissions of a user accessing files through a network share on a remote computer with a disk that is formatted in NTFS?
You must determine the effective permissions by analyzing the share permissions and NTFS permissions
85
When you sign an email with a(n) _______________, the email cannot be changed or modified without changing the digital signature.
Encrypted signature
86
How do you send an encrypted email message?
Sign the message with an encrypted signature to the message so that the recipient can read the message without decrypting it and only needs decryption to verify the sender's identity
87
Which authentication standard is enabled by default to secure network access for wireless network on Windows XP Service Pack 1 (SP1)?
IEEE 802.1x authentication standard
88
Which two protocols provide encrypted communications between 902.11x wireless clients and wireless access points?
Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA)
89
Which program is used to list frequently accessed shared folders on Windows XP computer?
My Network Places
90
Which process allows a shared folder from another computer to appear as a separate disk drive on your computer?
Drive mapping
91
Which technology used by cable modems varies the data transmission rate based on the number of users connected to the cable?
Shared connection technology
92
How many bit encryption key of initialization vector (IV) is generated and appended to the Wireless Equivalency Protocol (WEP) encryption key?
24-bit
93
What should you configure when setting up a wireless connection?
Configure the SSID and decide which encryption standard to use
94
Which protocol is used to indicate the subtype set authentication, whether or not encryption and authentication are used in data frames and management frames?
Wired Equivalent Privacy (WEP)
95
What are the two most commonly known types of malware?
Viruses and Trojan horses
96
What software damages or disrupts a system without the owner's permissions?
malware