Security Flashcards

1
Q

What is a code that runs on a computer without the users knowledge; it infects the computer when the code is accessed and executed?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is similar to viruses except that it self replicates whereas a virus does not?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What appears to perform a desired functions but are actually performing malicious functions behind the scenes?

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What malicious software either downloaded unwittingly from a website or installed along with some other third-party software?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What software designed to gain administrator local control over a computer system without being detected?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the abuse of electronic messaging system such as email, broadcast media, and instant messaging?

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Some ways to prevent and troubleshoot viruses are:

A

Antivirus software. Update the antivirus software. Make sure the computer has the latest service packs and updates. Run Windows Update. Make sure a firewall is enabled and up to date.
You should also disable Autorun for CD, DVD, and Blu-ray.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To disable AutoRun in Windows 7:

A

Click Start and type gpedit.msc
Go to Computer Configuration > Administrative Templates > Windows Components > Autoplay Policies
Double click the Turn Off Autoplay setting. Click Enabled radio button and click OK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Some symptoms of viruses are:

A
Computer runs slower than usual.
Computer locks up frequently.
Computer restarts on its own or crashes frequently.
Strange sounds occur.
Antivirus programs won't run.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a system is infected with a virus:

A

Disconnect the network cable from the computer. Make sure you back up critical data. Run a thorough scan with the antivirus program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Preventing and troubleshooting Spyware:

A

Download and install anti-spyware protection software.
Adjust Internet Explorer security settings.
Turn on the Phishing filter in IE.
Uninstall unnecessary application’s.
Educate users on how to surf the web safely.
Consider technologies that discourage spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some symptoms of spyware are:

A

The web browser’s default homepage has been modified.
A particular website comes up every time you perform search.
Excessive pop up windows appear.
The network adapter’s activity LED blinks frequently even when the computer is not transmitting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To repair Spyware:

A

First disconnect the system from the Internet.
Then try uninstalling the program from Control Panel > Programs and Features in Windows 7/Vista, and Add/Remove Programs in XP.
Then reboot the computer.
You can use HijackThis program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Preventing and troubleshooting rootkits:

A

The best way to identify root kit is to use removable media to boot the computer. Reinstall all software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Preventing and troubleshooting spam:

A

Use a strong password.
Use a spam filter.
Use whitelists and blacklists.
Train your users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is access to an organization’s premises, computer resources and date out without consent of the owner?

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unauthorized access can be prevented through the use of authentication.

A

Something that the user knows, for example, a password or PIN.

Something that user has, for example a smart card or other security token.

Something that user is, for example the biometric reading of a fingerprint or retina scan.

Something that user does, for example a signature or speaking words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You should always lock rooms and closets and you can even lock PCs and laptops.

A

Configure the BIOS to lock whether someone opened the case of the computer.

This is logged as chassis intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The most common electronic entry system is the card key system.

A

Other electronic systems will use key towards incorporate a photo ID, or magnetic stripe, barcode, or a radio frequency identification chip (RFID).
Some organizations will design what is known as a mantrap, an area with two locking doors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the science of recognizing humans based on one or more physical characteristics?

A

Biometrics

An example of biometric hardware is the Microsoft Fingerprint Scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Protecting data physically:

A

Password should not be written down and not left on the desk or taped to a monitor.
Users should lock their computers when they leave their workstation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the act of manipulating users into revealing confidential information or performing other actions detrimental to the user?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the attempt at fraudulently obtaining private information?

A

Phishing

An example of phishing would be an email that requests verification of private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is when a person uses direct observation to find out a target’s password, PIN, or other such authentication information?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is when an unauthorized person tags along with an authorized person to gain entry to a restricted area usually with the person’s consent?

A

Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When a hard drive is removed from my computer it either needs to be recycled or disposed of in a proper manner.

A

Sanitizing the hard drive is a common way of removing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are three options for data removal?

A

Clearing: this is the removal of data with a certain amount of assurance that it cannot be reconstructed.

Purging: this is the removal data done in such a way so that I cannot be reconstructed by any known technique. The media is released outside the company.

Destruction: this is when the storage media is physically destroyed through pulverizing, drilling holes through the platters, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following malware self replicates?

A. Virus
B. Worm
C. Trojan
D. Rootkit

A

B. Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What type of malware is the abuse of electronic messaging?

A. Virus
B. Spyware
C. Spam
D. Worm

A

C. Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which is the following are symptoms of viruses? (Select the the best answers.)

A. Computer runs slowly.
B. Computer locks up.
C. Excessive pop-up windows appear.
D. A strange website is displayed when a seedy is done.
E. Unusual error messages are displayed.
A

A, B, and E.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is the science of recognizing humans based on physical characteristics?

A. Mantraps
B. Biometrics
C. Tailgating
D. Something a person is

A

B. Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A hard drive needs to be disposed of in a way so that no one can access the data. Which method should you use?

A. Phishing
B. Cleaning
C. Shoulder surfing
D. Destruction

A

D. Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is the best mode to use when scanning for viruses?

A. Safe Mode
B. Last Known Good Configuration
C. Command Prompt only
D. Boot into Windows normally

A

A. Safe Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is one way to prevent spyware?

A. Use firewall exceptions
B. Adjust Internet Explorer settings
C. Adjust the Internet Explorer homepage
D. Remove the spyware from Add/Remove Programs

A

B. Adjust Internet Explorer settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

One of your customers tells you that a bank employee called and asked for the person’s bank balance and telephone number. What is this an example of?

A. Spam
B. Virus
C. Social Engineering
D. Trojan

A

C. Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

There are four types of user accounts:

A

Administrator
User
Power User
Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

This account has full control of an operating system.

A

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

This account is the normal standard account for a person on a network.

A

User

40
Q

This account has the ability to do some admin tasks but not full control.

A

Power User

41
Q

This account has limited access to the system.

A

Guest

42
Q

What is required for a strong password?

A

At least 8 characters, including 1 uppercase letter, 1 number, and 1 special character.

43
Q

How do you access Password Policy?

A

Start > All Programs >Administrative Tools > Local Security Policy > Security Settings > Account Policies > Password Policy

44
Q

Enforce password history:

A

When this is defined users cannot use any of the passwords that are remembered in the history. If you see the history to 3, then the last 3 passwords cannot be used again when it is time to change the password.

45
Q

Maximum and minimum password age:

A

This defines exactly how long a password can be used.

46
Q

Minimum password length:

A

This requires that the password must be at least a specified amount of characters. For a strong password policy, set this to between 8 and 14.

47
Q

Passwords must meet complexity requirements:

A

Uppercase characters, lowercase characters, digits between 0 and 9, and special characters.

48
Q

Rename and password protect the administrator account:

A

Computer Management > System Tools > Local Users and Groups > Users and locate the Administrator account. Right click and then rename it and give it a password.

49
Q

To enable the administrator account:

A

Open command line and type:

net user administrator /active:yes

50
Q

Verify that the Guest account is disabled:

A

Local Users and Groups > Users, and right click account, select Properties, and then check the box named Account is Disabled.

51
Q

Set the account lockout threshold:

A

Local Security settings window.

Security Settings > Account Policies > Account Lockup Policy

52
Q

To turn on/off UAC:

A

Start > Control Panel > User Accounts and Family Safety. Then select User Accounts, and click the Change User Account Control settings.

53
Q

To view files sigh as bootmgr, pagefile.sys, and hiberfil.sys:

A

Deselect the Hide Protected Operating System Files check box.

Go to Windows Explorer > Tools menu, and click Folder Options. Then select View tab and under Hidden Files and Folders select the Show Hidden Files button.

54
Q

Administrative shares can be created by simply adding what?

A

Adding a $ to the end of the share name when enabling the share.

55
Q

Where are NTFS permissions modified?

A

In the Security tab of the folder’s Properties window.

56
Q

What is the process of converting information, with the use of a cipher (algorithm), making it unreadable by other users unless they have the correct key to the information?

A

Encryption

57
Q

To encrypt a file in Windows:

A

Locate the file, right-click and select Properties.
At the bottom of the General tab, click the Advanced button.
Check the box labeled Encrypt Contents to Secure Data.
Click OK for both windows.

58
Q

The requirements for BitLocker encryption are:

A

A Trusted Platform Module: a chip residing on the motherboard that actually stores the encrypted keys.

An external USB key to store the encrypted keys.

A hard drive with two volumes, preferably created during the installation of Windows.
One volume for the operating system and the other is the active volume that remains unencrypted so that the computer can boot.

59
Q

BitLocker software is based on the Advanced Encryption Standard (AES):

A

It uses a 128-bit key.

60
Q

What is meant to protect client computers from malicious attacks and intrusions?

A

Windows Firewall

61
Q

Enforce password history:

A

When this is defined users cannot use any of the passwords that are remembered in the history. If you see the history to 3, then the last 3 passwords cannot be used again when it is time to change the password.

62
Q

Maximum and minimum password age:

A

This defines exactly how long a password can be used.

63
Q

Minimum password length:

A

This requires that the password must be at least a specified amount of characters. For a strong password policy, set this to between 8 and 14.

64
Q

Passwords must meet complexity requirements:

A

Uppercase characters, lowercase characters, digits between 0 and 9, and special characters.

65
Q

Rename and password protect the administrator account:

A

Computer Management > System Tools > Local Users and Groups > Users and locate the Administrator account. Right click and then rename it and give it a password.

66
Q

To enable the administrator account:

A

Open command line and type:

net user administrator /active:yes

67
Q

Verify that the Guest account is disabled:

A

Local Users and Groups > Users, and right click account, select Properties, and then check the box named Account is Disabled.

68
Q

Set the account lockout threshold:

A

Local Security settings window.

Security Settings > Account Policies > Account Lockup Policy

69
Q

To turn on/off UAC:

A

Start > Control Panel > User Accounts and Family Safety. Then select User Accounts, and click the Change User Account Control settings.

70
Q

To view files sigh as bootmgr, pagefile.sys, and hiberfil.sys:

A

Deselect the Hide Protected Operating System Files check box.

Go to Windows Explorer > Tools menu, and click Folder Options. Then select View tab and under Hidden Files and Folders select the Show Hidden Files button.

71
Q

Administrative shares can be created by simply adding what?

A

Adding a $ to the end of the share name when enabling the share.

72
Q

Where are NTFS permissions modified?

A

In the Security tab of the folder’s Properties window.

73
Q

What is the process of converting information, with the use of a cipher (algorithm), making it unreadable by other users unless they have the correct key to the information?

A

Encryption

74
Q

To encrypt a file in Windows:

A

Locate the file, right-click and select Properties.
At the bottom of the General tab, click the Advanced button.
Check the box labeled Encrypt Contents to Secure Data.
Click OK for both windows.

75
Q

The requirements for BitLocker encryption are:

A

A Trusted Platform Module: a chip residing on the motherboard that actually stores the encrypted keys.

An external USB key to store the encrypted keys.

A hard drive with two volumes, preferably created during the installation of Windows.
One volume for the operating system and the other is the active volume that remains unencrypted so that the computer can boot.

76
Q

BitLocker software is based on the Advanced Encryption Standard (AES):

A

It uses a 128-bit key.

77
Q

What is meant to protect client computers from malicious attacks and intrusions?

A

Windows Firewall

78
Q

How do you access Windows Firewall?

A

Start > Control Panel > Windows Firewall

79
Q

Which of the following is the strongest password?

A. |ocrian#
B. Marqu1sD3S0d
C. ThisIsV#ryS3cure
D. Thisisverysecure

A

C.

80
Q

Which of these is a security component of Windows 7/Vista?

A. UAC
B. UPS
C. Gadgets
D. Control Panel

A

A. UAC

81
Q

A customer complains that while away at lunch someone used his computer to send emails to other coworkers without his knowledge. What should you recommend?

A. Enable a screensaver.
B. Unplug the network cable before leaving for lunch.
C. Use the Windows Lock feature.
D. Enable the out of office message in email when leaving for lunch.

A

C. Use the Windows lock feature.

82
Q

Which of the following best describes encryption?

A. Prevents unauthorized users from viewing or reading data.
B. Prevents unauthorized users from deleting data.
C. Prevents unauthorized users from posing as the original source sending data.
D. Prevents unauthorized users from decompressing files.

A

A.

83
Q

One of the users on your network is trying to access the files shared on a remote computer. The files share for missions allow the user Full Control. But, the NTFS permissions allow the user Read access. What will be the resulting access for the user?

A. Full Control
B. Modify
C. Read
D. Write

A

C. Read

84
Q

You are the administrator for your network. You set up an administrative share called Data$. What is necessary for another user to access the share? (Select the two best answers.)

A. The user must be part of a HomeGroup.
B. The user must have permissions to access the share.
C. The user must know the decryption key.
D. The user must know the exact network path to the share.
E. The user must enable File Sharing in the Network and Sharing Center.

A

B and D.

85
Q

Always remember to change what first before anything else on a router?

A

The admin password

86
Q

Wireless Encryption Methods:

A
WEP: 64-bit
WPA: 128-bit
WPA2: 256-bit
TKIP: 128-bit
CCMP: 128-bit
AES: 128, 192, and 256-bit
87
Q

What filters out which computers can access the wireless network?

A

MAC Filtering

88
Q

What was originally intended to make connecting to a wireless access point easier for the average user?

A

WPS (Wi-Fi Protected Setup)

89
Q

Which of the following describes an attempt to guess a password by using a combination of letters and numbers?

A. Brute force
B. Social Engineering
C. WPS
D. War driving

A

A. Brute force

90
Q

Which of the following will help to secure a SOHO router? (Select the three best answers)

A. Change default passwords
B. Enable SSID
C. Enable MAC filtering
D. Enable WPS
E. Enable WPA2
A

A, C, and E.

91
Q

Which is the strongest form of wireless encryption?

A. WPA
B. WEP
C. AES
D. TKIP

A

C. AES

92
Q

You want to prevent rogue employees from connecting a laptop to the SOHO router and accessing the network. How can you accomplish this? (Select the two best answers)

A. Enable MAC filtering
B. Create a DMZ.
C. Configure a complex SSID.
D. Disable physical ports.

A

A and D.

93
Q

Android settings can be backed up and restored by:

A

Settings > Privacy

94
Q

How do you update an Android device?

A

Settings > System Updates > Software Update.

95
Q

How do you update an iOS device?

A

Settings > General > Software Update

96
Q

What is the process of removing the limitations that Apple imposes on its devices that run iOS?

A

Jailbreaking

97
Q

What is software that takes care of pushing updates and configuring hundreds of mobile devices from a central location?

A

Mobile Device Management (MDM) suite