Security Flashcards Preview

A+ 220-801, 220-802 Q&A > Security > Flashcards

Flashcards in Security Deck (96)
1

What is a smart card?

A hardware device that has an embedded microchip that contains authentication or security information

2

What is a digital signature?

An electronic signature that can be used to prove the sender's identity or a document's signer

3

What is a digital certificate?

An electronic file that establishes your identity via a public key infrastructure (PKI) to complete transactions

4

What is chassis intrusion detection in the BIOS?

A physical intrusion detection system that alerts the user if the computer's cover has been removed

5

Which type of attach is conducted by an email request from a financial institution asking you to log in and change your password using the provided link?

Phishing

6

What type of attack uses drones to obtain email accounts to send spam?

A botnet attack

7

What is the quickest way to lock a Windows 7 computer?

Win + L

8

How should you protect a portable computer from being stolen in your absence if the portable computer cannot be physically secured using a locking mechanism?

Lock the portable computer in a drawer

9

What should you do to ensure that an authorized user does not reveal security information or credentials to any unauthorized person?

Implement social engineering mitigation techniques

10

Which guidelines should you refer to if you find that someone has breached the security of the server room?

The company's security policy

11

What is the FIRST action you should perform if you find that your fellow technician has left the door of the server room open?

Close the door

12

Which software gather's the user's information through the user's internet connection without the user's knowledge?

Spyware

13

Which recommended file system format for Windows XP enables advanced performance, security, and reliability features?

NTFS

14

What are two ways that you can encrypt a file?

• Right-click the file, select Properties, and click Advanced.
• Use the Cipher command

15

How can you enable some users to access certain files and restrict others from accessing the same files?

Set different permissions for the users

16

What are the four primary user groups on a Windows XP computer?

Administrators, Power Users, Users, and Guests

17

Which two passwords can be configured using the BIOS setup utility?

Supervisor password and user password

18

Which password can be configured to prevent unauthorized access to the BIOS setup utility?

Supervisor password

19

Which password prevents unauthorized users from booting up the computer?

User password

20

What should a technician do when facing an error 'SSL certificates are no longer valid'?

Clear the SSL slate in Internet Explorer

21

Which type of software can assist you in protecting your computer against virus-related problems?

Antivirus

22

Why should you not store passwords in a text file on your desktop?

Someone can open the file and read your passwords

23

In a Microsoft Active Directory domain, what must a user's password contain by default?

A password must contain three out of the following four conventions:
• Upper-case letters
• Lower-case letters
• Numeric or special characters
• At least 8 characters

24

What should an administrator tell a user about passwords?

Memorize the password, and do not tell anyone the password

25

What is the maximum length of the Windows password that is supported by Windows XP?

127 characters

26

What can you configure on a Microsoft Active Directory domain to ensure that all Windows XP and Vista users have passwords that adhere to the company security policy?

Group Policy object

27

What is the latest encryption standard that must be used to protect the data being transmitted over a wireless network?

Wi-Fi Protected Access, second generation (WPA2)

28

What are the three levels of encryption standards for wireless networks?

WEP, WPA, and WPA2

29

Which tool helps determine the security state of an organization?

Windows Baseline Security Analyzer

30

What should you do if you overhear a private conversation between two managers of a different department?

Keep the information confidential

31

Which security protocol is used to secure wireless local area networks (WLANs) defined in the IEEE 802.11 wireless networking standard?

Wired Equivalent Privacy (WEP)

32

What type of virus generally affects the system by attaching itself to MS-Office applications?

Macro virus

33

What type of virus can infect system files and boot sectors of a computer system?

Multipart and boot sector viruses

34

What does a polymorphic virus do?

Produces multiple operational copies of itself

35

What does a self-garbling virus do?

Formats its own code to prevent antivirus software from detecting it

36

What does a stealth virus do?

Hides the changes it makes as it replicates

37

What is a Trojan horse?

Malware that is disguised as a useful utility but embeds malicious code in itself

38

What is a virus?

Malicious software (malware) that relies upon other application programs to execute and infect a system

39

What uses tracking cookies to collect and report on a user's activities?

Spyware

40

Which attributes or details of an employee can be used by biometric devices?

They include:
• Fingerprints
• Face
• Signature
• Iris
• Retina
• Hand geometry

41

What are two common tools from Microsoft to fight malware?

Windows Defender and Microsoft AniSpyware

42

What is the purpose of BitLocker in Windows Vista?

Drive encryption

43

Which wireless security protocol is most secure: WPA, WPA2, or WEP?

WPA2

44

Which Windows feature can cause your system to be reinfected with a virus?

The System Restore feature

45

In biometrics, which security is worse: a false negative or a false positive?

False positive

46

In biometrics, what is a false positive?

When someone who is NOT supposed to have access to the system is erroneously granted access

47

In biometrics, what is a false negative?

When someone who is supposed to have access to the system is erroneously denied access

48

What is adware?

Software installed on your computer that automatically displays advertisements when the software is running

49

Which security device protects the local network from outside hacking by blocking ports and filtering MAC addresses?

A firewall

50

What is the number of characters in a 256-bit WEP key?

58

51

What is the number of characters in a 104-bit WEP key?

26

52

What is the number of characters in a 40-bit WEP key?

10

53

Which command is used to run the driver installation of wireless connection?

DEVMGMT.MSC

54

Which encryption key is used to provide security along with the service set identifier (SSID) to access a secure wireless network?

The Wired Equivalent Privacy (WEP) key

55

Where is the Security Center icon located in Windows XP?

In Control Panel

56

The Security Center icon in Windows XP was introduced with which Service Pack?

SP2

57

In which specific area of a hard disk drive does a boot-sector virus place its starting code?

Master Boot Record (MBR)

58

What should you do to effectively use your virus scanner to protect your computer from mail-, Wed-, and removable media-borne viruses?

Configure the virus scanner to scan email, web pages, and removable media as well as your hard drive

59

What type of attack takes the control of a session between a server and a client?

Session hijacking

60

Which device can be installed to monitor visitor entry into a server room when there is not enough manpower to escort the visitor?

Video surveillance cameras or closed-circuit television (CCTV)

61

Which type of cards use a public key infrastructure (PKI) for secure access?

Smart cards

62

Which mode of communication does Bluetooth wireless technology use?

Radio waves

63

Which three types of characters can be used in combination to set a strong password in Windows XP?

Alphabetic, numeric, and special characters

64

Which wizard is used to setup a wireless connection in Windows XP?

Wireless Network Setup Wizard

65

Which tab on the Wireless Connection Properties dialog box of Windows XP SP1 or SP2 should be used to specify the name of the server to be used for authentication?

The Authentication tab

66

What should you do if your smart card is stolen?

Get it inactivated and replaced

67

Which authentication method uses a small card with an embedded silicon chip which stores information on it?

Smart card authentication

68

Which authentication method uses fingerprint recognition as a method to identify an individual?

Biometric authentication

69

Which authentication method can be used to identify a person on the basis of that person's physiological or behavioral characteristics?

Biometric authentication

70

Which option should be selected in Control Panel > Administrative Tools to create a new local group?

Computer Management

71

Which tab under the User Accounts option in Control Panel will you use to ensure that a user must press the Ctrl+Alt+Del keys before logging in?

The Advanced tab

72

If a drive or a partition is converted from FAT32 to NTFS, which step needs to be performed to convert it back to FAT32 in Windows XP?

Format the drive or partition

73

What should you do to notify a user before deleting a shared folder from a network computer?

Send a Console Message by navigating to Computer > Management > Shared Folders > Shares > All tasks > Send Console Message

74

Which step should be performed first while deleting a shared folder from a network computer?

Notify all users by sending a console message

75

Which three permissions are given to a user by default when a folder is shared on a Windows XP computer?

Read and Execute, List Folder Contents, and Read permissions

76

What is the recommended process when you need to assign a group of permissions to a set of users?

Create a group. Assign the permissions to the group. Add all the user accounts to the group.

77

Why should you disable all unused features of your Web browser?

To provide the best security for your web browser

78

What is the term for creating TCP/IP packets using somebody else's IP address?

IP spoofing

79

Where on a Windows XP computer can you find information about the user accounts that previously logged into the computer?

Security Log in Event Viewer

80

Which type of attack attempts to disrupt access to the server, which is forced to re-authenticate on each web page?

Distributed denial-of-service (DDoS)

81

On which protocol does an attacker attack by taking advantage of the security flaws during network implementation to carry out land attacks?

Transmission Control Protocol/Internet Protocol (TCP/IP)

82

Which five main attack vectors are used by social engineering hackers?

Online, telephone, waste management, personal approaches, and reverse social engineering

83

What is the name of the technique of circumventing technological security measures by manipulating people to disclose secure information?

Social engineering

84

What must you consider when calculating the effective permissions of a user accessing files through a network share on a remote computer with a disk that is formatted in NTFS?

You must determine the effective permissions by analyzing the share permissions and NTFS permissions

85

When you sign an email with a(n) _______________, the email cannot be changed or modified without changing the digital signature.

Encrypted signature

86

How do you send an encrypted email message?

Sign the message with an encrypted signature to the message so that the recipient can read the message without decrypting it and only needs decryption to verify the sender's identity

87

Which authentication standard is enabled by default to secure network access for wireless network on Windows XP Service Pack 1 (SP1)?

IEEE 802.1x authentication standard

88

Which two protocols provide encrypted communications between 902.11x wireless clients and wireless access points?

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA)

89

Which program is used to list frequently accessed shared folders on Windows XP computer?

My Network Places

90

Which process allows a shared folder from another computer to appear as a separate disk drive on your computer?

Drive mapping

91

Which technology used by cable modems varies the data transmission rate based on the number of users connected to the cable?

Shared connection technology

92

How many bit encryption key of initialization vector (IV) is generated and appended to the Wireless Equivalency Protocol (WEP) encryption key?

24-bit

93

What should you configure when setting up a wireless connection?

Configure the SSID and decide which encryption standard to use

94

Which protocol is used to indicate the subtype set authentication, whether or not encryption and authentication are used in data frames and management frames?

Wired Equivalent Privacy (WEP)

95

What are the two most commonly known types of malware?

Viruses and Trojan horses

96

What software damages or disrupts a system without the owner's permissions?

malware